[] NeoSense

Tutos 1.1 - 'File_Select.php' Cross-Site Scripting

Author: François SORIN
type: webapps
platform: php
port: 
date_added: 2003-06-20 
date_updated: 2012-11-19 
verified: 1 
codes: CVE-2003-0481;OSVDB-2192 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/8011/info

It has been reported that Tutos does not properly handle input to the file_select script. Because of this, an attacker may be able to execute code in the browser of another user with the privileges of the vulnerable site.

http://www.example.com/tutos/file/file_select.php?msg=<hostile code>