Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » Faq-O-Matic Cross-Site Scripting Vulnerability

Faq-O-Matic Cross-Site Scripting Vulnerability

by Nikola Strahija on February 6th, 2002 FAQ-O-Matic does not sufficiently filter script code from URL parameters. It is possible to create a malicious link containing arbitrary script code. When a legitimate user browses the malicious link, the script code will be executed in the user's browser in the context of the website running Faq-O-Matic.


As a result, it may be possible for a remote attacker to steal cookie-based authentication credentials from a legitimate user of the user.

FAQ-O-Matic is a freely available, open-source FAQ (Frequently Asked Questions) manager. It is intended to run on Linux and Unix variants.

Exploit:

The following example was provided:

http://faqomaticsite/cgi-bin/fom/fom.cgi?cmd=alert("superpetz")&file=1&keywords=superpetz


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »