2008/1/14, GF <[EMAIL PROTECTED]>:
>
> >
> > Sorry again Fabio, but I need to understand: the querystring does not
> seem
> > to have a "param=value" structure, and <s:url> has "test" as action, and
> > does not take any dynamic value (i.e. parameter), but maybe I am missing
> > something.
>
> The bug is calling that page itself (I mean XSS.jsp) passing via GET
> the malicious querystring.
> The "test action" is never called. You get the XSS exploit on XSS.jsp
>
> I pasted somewhere the full code of XSS.jsp, call it passing the
> malicious querystring (on IE6) and you will see the javascript being
> executed.



Ok understood, thanks, sorry for my dumbness :-)
It's monday after all :-)

Antonio

Reply via email to