[] NeoSense

MOJO IWms 7 - 'default.asp' Cookie Manipulation

Author: cp77fk4r
type: webapps
platform: asp
port: 
date_added: 2007-12-17 
date_updated: 2014-08-16 
verified: 1 
codes:  
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/41746/info

MOJO IWMS is prone to a cookie-manipulation vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this vulnerability could allow an attacker to masquerade as another user. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

MOJO IWMS 7 is vulnerable; other versions may also be affected.

The following example URI is available:

http://www.example.com/upload/default.asp?mode=wrong&ERRMSG=%3Cmeta+http-equiv='Set-cookie'+content='[Cookie-Name]=[Cookie-Value]'%3E