1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 |
source: https://www.securityfocus.com/bid/54045/info Multiple Webify products are prone to multiple HTML-injection and local file-include vulnerabilities because they fail to properly sanitize user-supplied input. Exploiting these issues could allow an attacker to execute arbitrary HTML and script code in the context of the affected browser, steal cookie-based authentication credentials, and execute arbitrary local scripts in the context of the web server process. Other attacks are also possible. The following Webify products are vulnerable: Webify eDownloads Cart Webify eDownloads Webify Project Manager Webify Blog Local file include: http://www.example.com/index.php?page=[LOCAL FILE INCLUDE] http://www.example.com/admin/index.php?page=[LOCAL FILE INCLUDE] HTML injection: http://www.example.com/admin/index.php?page=query [Persistent Script Code Inject via Query Value] http://www.example.com/admin/index.php?page=addobjects [Persistent Script Code Inject via addObject name Value] http://www.example.com/admin/index.php?page=formdesigner [Persistent Script Code Inject via former label Value] http://www.example.com/admin/index.php?page=comments [Persistent Script Code Inject via Comment text & name Value] http://www.example.com/admin/index.php?page=submissions [Persistent Script Code Inject via submission name Value] |