AOH :: HP Unsorted P :: B06-2870.HTM

P.a.i.d v2.2



P.A.I.D v2.2
P.A.I.D v2.2



P.A.I.D v2.2

Homepage:
http://www.webexceluk.net

Effected files:
faq.php
input form of logging in.
index.php

The input forms of logging into My Account do not sanatize user input. For PoC of a XSS attack simply put in:
"><"

It also seems when logging in, even if your details are incorrect and you browse normal parts of the site like the FAQ or the Contact Us page etc, a message will be output in the top righton the screen with the text "Welcome back,username", as if you were successfully logged in.

faq.php XSS Vulnerability via URLinjection:

<"">http://www.example.com/paid/faq.php?farea=2"><"


index.php XSS Vulnerability via read variable:

http://example.com/paid/index.php?read= 

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.