https://www.cacert.org/wot.php?id=5 multiple POST[email] XSS
This is part of a code audit on cacert sources. Francesco 'ascii' Ongaro - www.ush.it
HTML POC
>>> POST XSS and external source load POC <<<
Fast check
ND, i don't have the required access level and i'm
too lazy to setup a test enviroment : )
Vulnerable code
./pages/wot/5.php
|
Summary
- POST XSS
- magic quotes gpc ON
- affected by user role (only logged in ad with right permissions)