• Icon: Bug Bug
    • Resolution: Incomplete
    • Icon: Critical Critical
    • core
    • Linux Debian

      we found few vulnaribilities. If you append this

      http://yourdomainname.com:8080//search/suggestOpenSearch?q=%27"%28%29%26%251<ScRiPt%20>prompt%28'VULN'%29<%2fScRiPt>

      Is Vulnerable To Cross Site Scripting

      This vulnerability affects /search/suggestOpenSearch
      on Parametter ?q=

      HTTP Parameter Pollution on builds /loginError

      HPP attacks consist of injecting encoded query string delimiters into other existing parameters. If the web application does not properly sanitize the user input, a malicious user can compromise the logic of the application to perform either clientside or server-side attacks.

      Attack details

      This vulnerability affects /j_acegi_security_check.

      URL encoded POST input from was set to &n990198=v931935
      Parameter precedence: last occurrence
      Affected link: login?from=&n990198=v931935
      Affected parameter: from=

      The impact depends on the affected web application. An attacker could

      Override existing hardcoded HTTP parameters
      Modify the application behaviors
      Access and, potentially exploit, uncontrollable variables
      Bypass input validation checkpoints and WAFs rules

            Unassigned Unassigned
            acolta Andrei Colta
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

              Created:
              Updated:
              Resolved: