Hello dear developers,

first of all I would like to thank all of you for the great work you
are doing on w3af.

I started using it some time ago and have come across the following
issue:

Scanning a customers website, I found a XSS vunerability using
Acunetix. This is the First Line of the HTTP header sent by Acunetix:

GET /html/contact.php/%22onmouseover%3d'prompt(975175)'bad%3d%22%3e HTTP/1.1

The vunerability is caused by the use of $_SERVER['PHP_SELF'] in the
action attribute of a form tag.

I was not able to find this vunerabilty using w3af though.

I is possible to extend the xss plugin to also test for this kind of
attack? It would be great!

Best regards

Tobias Assmann
_______________________________________________________

 SkyGate internetworking GmbH
 Pfuelstrasse 5, Aufgang VI
 D - 10997 Berlin
 Handelsreg. Berlin Charlottenburg, HRB 87258
 Geschaeftsfuehrer: Stephan Jensen

 T: +49- (0)30 - 611038-0
 F: +49- (0)30 - 61280465
 W: http://www.skygate.de
_______________________________________________________



------------------------------------------------------------------------------
Master Visual Studio, SharePoint, SQL, ASP.NET, C# 2012, HTML5, CSS,
MVC, Windows 8 Apps, JavaScript and much more. Keep your skills current
with LearnDevNow - 3,200 step-by-step video tutorials by Microsoft
MVPs and experts. ON SALE this month only -- learn more at:
http://p.sf.net/sfu/learnmore_122712
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to