TDizin - 'Arama.asp' Cross-Site Scripting

Author: GeFORC3
type: webapps
platform: asp
port: 
date_added: 2007-06-18  
date_updated: 2013-12-11  
verified: 1  
codes: CVE-2007-3310;OSVDB-36375  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 30198.txt  
source: https://www.securityfocus.com/bid/24515/info

TDizin is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.

Exploiting this vulnerability may allow an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected website. As a result, the attacker may be able to steal cookie-based authentication credentials and to launch other attacks.

http://www.example.com/TDizin/arama.asp?ara= "><script>alert("G3");</script>&submit=+T%27ARA+