Guest User

Untitled

a guest
Apr 26th, 2016
31
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.50 KB | None | 0 0
  1. LaNuitDebout XPATH injection vulnerability
  2.  
  3. I said it all...
  4. Since they have no contact informations...
  5. https://chat.nuitdebout.fr/home?name=&emailOrUsername=&email=&pass=&confirm-pass=
  6. Modifying form field using a simple payload such as 'or '1'='1 has direct effect on data validation, sending and could lead to unauthorized access.
  7.  
  8. No bragging, no datas, no harm. I just had no other way to tell the devs...
  9.  
  10. https://www.reddit.com/r/hacking/comments/4gk9zh/lanuitdebout_xpath_injection_vulnerability/
Add Comment
Please, Sign In to add comment