Lucene search

K
exploitdbR0tEDB-ID:27719
HistoryApr 21, 2006 - 12:00 a.m.

phpLDAPadmin 0.9.8 - 'rename_form.php' Cross-Site Scripting

2006-04-2100:00:00
r0t
www.exploit-db.com
12

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/17643/info
  
PHPLDAPAdmin is prone to multiple input-validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
  
An attacker can exploit these issues to execute arbitrary HTML and script code in the browser of a victim user in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials, to control how the site is rendered to the user, and to launch other attacks.

http://www.example.com/rename_form.php?server_id=0&dn=%22%3Cscript%3Ealert('r0t')%3C/script%3E