>
> Sorry again Fabio, but I need to understand: the querystring does not seem
> to have a "param=value" structure, and <s:url> has "test" as action, and
> does not take any dynamic value (i.e. parameter), but maybe I am missing
> something.

The bug is calling that page itself (I mean XSS.jsp) passing via GET
the malicious querystring.
The "test action" is never called. You get the XSS exploit on XSS.jsp

I pasted somewhere the full code of XSS.jsp, call it passing the
malicious querystring (on IE6) and you will see the javascript being
executed.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to