Topic #4499 (no title)
0 guests and 0 members have recently viewed this.
The top 3 point earners from 8th Feb 2026 to 15th Feb 2026.
| Gabri |
|
|
|---|---|---|
| Master Rat |
|
|
| PDStig |
|
|
There are no events at this time
(Click to enlarge)
#4633 - Reflected Cross Site Scripting (XSS)
Waiting for the resolution.
http://example-site/data/ajax_tree.php?hook=choose_gallery&id=&options=a:5:{s:21:"must_accept_something";b:1;s:6:"purity";b:0;s:14:"addable_filter";b:1;s:6:"filter";N;s:9:"member_id";N;}&default=<something:script xmlns:something="http://www.w3.org/1999/xhtml">alert("Hello")</something:script>
The JavaScript is executing within the XML mime type via XML namespaces. Resolution is simple but we need to be careful to assume that XSS is not able to happen within other XML outputs.
One particular AJAX script that produces XML may be manipulated to output executable arbitrary JavaScript code. An XSS vulnerability is one whereby a hacker crafts a vulnerable URL that they then trick a target user (such as the webmaster) to access, causing the code to run on their machine and potentially expose things such as login cookies.
Thank You.
Author: Orion Hridoy
Company: BugsBD Private LTD.