![]() |
another question for xss
well
if u try to put some string like this Код:
"><script>alert(document.cookie)</script>http://www.proplay.ru/ http://funkyimg.com/u/677402JPG.jpg result: http://funkyimg.com/u/712561JPG.jpg Another site: http://funkyimg.com/u/914555JPG.jpg http://funkyimg.com/u/633204JPG.jpg my question: You think that can be exploitable? |
Just if request method is get, because method post is invisible.
|
I have found many site vulnerable to xss on admin (user) login,and I think that using some cookie sniffer can be done something.
thx for your answer Mr.NOmeR1 (you are right) ;) |
Even if the request method is post, you can write a PHP script to post the data, and it will be still exploitable. If I am wrong, correct me =)
|
you can use post (it will be better)
you can get admin's passwd ( use javascript) sorry for my english |
Цитата:
|
http://www.proplay.ru/
- method GET not supported - no referer-control http://yourhost.xz/g.html - link with XSS-exploit file g.html Код:
Another site -->> by analogy |
| Время: 21:47 |