Tutos 1.1 - 'File_Select.php' Cross-Site Scripting

EDB-ID:

22818




Platform:

PHP

Date:

2003-06-20


source: https://www.securityfocus.com/bid/8011/info

It has been reported that Tutos does not properly handle input to the file_select script. Because of this, an attacker may be able to execute code in the browser of another user with the privileges of the vulnerable site.

http://www.example.com/tutos/file/file_select.php?msg=<hostile code>