The provided text describes a cross-site scripting (XSS) vulnerability in JaWiki, where user-supplied input is not properly sanitized. The example URL demonstrates how an attacker could inject arbitrary script code into the browser context of an unsuspecting user.
Classification
Writeup 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target:JaWiki
No auth needed
Prerequisites:Access to a vulnerable JaWiki instance · Ability to craft a malicious URL