HTTPCSEuropean cybersecurity leader

| About us
30/11/-0001 :

phpList 'type[1]' Cross Site Scripting Vulnerability


HTTPCS Advisory : Httpcs-22
Product : phpList
Version : 2.10.18
Date : 13/06/2012
Severity level: ○ Less Critical
Description : A vulnerability has been discovered in phpList, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the 'type[1]' parameter to '/lists/admin/?page=attributes' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Page : /lists/admin/?page=attributes
Variables : required[1]=1&required[0]=1&tag[1]=1&tag[2]=2&tagaction=Merge&name[1]=State&action=Save Changes&required[2]=1&type[1]=[VulnHTTPCS]
Type : XSS
Method : POST
Solution :
Credit : HTTPCS [Web Vulnerability Scanner]


HTTPCS desktop screenshot Scanner HTTPCS tablet screenshot Scanner HTTPCS phone screenshot Scanner