Sage 1.3.x - IMG Element Input Validation
Author: Kevin Kierznowski
type: remote
platform: windows
port:
date_added: 2006-09-08
date_updated: 2013-10-20
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/21164/info
The application is prone to an input-validation vulnerability that allows malicious HTML and script code to be injected before it is used in dynamically generated content.
Attacker-supplied HTML and script code would execute in the context of the affected application, potentially allowing an attacker to steal cookie-based authentication credentials; other attacks are also possible.
<img src="http://www.example.com/images/jss.jpg" <script>alert(.blah.);</script> ></img>