Here is the email from the email template pa:
Total impact: 86
Affected tags: xss, csrf, rfe, id, lfi, sqli
Variable: REQUEST.t_FriendRequest_Body | Value: <html>
<body style=\"font: 12px Verdana; color:#000000\">
<p><b>Dear <Recipient></b>,</p>
<br />
<p><a href=\"<SenderLink>\"><Sender></a> is inviting you to be friends. To accept/reject his/her invitation please
follow this <a href=\"<RequestLink>\">link</a></p>
<br />
<p><b>Thank you for using our services!</b></p>
<p>--</p>
<p style=\"font: bold 10px Verdana; color:red\"><SiteName> mail delivery system!!!
<br />Auto-generated e-mail, please, do not reply!!!</p>
</html>
Impact: 43 | Tags: xss, csrf, rfe, id, lfi, sqli
Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: finds malicious attribute injection attempts | Tags: xss, csrf | ID: 69
Description: Detects data: URL injections, VBS injections and common URI schemes | Tags: xss, rfe | ID: 27
Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33
Description: Detects common comment types | Tags: xss, csrf, id | ID: 35
Description: Detects comments to exploit firefox' faulty rendering and proprietary opera attacks | Tags: xss, csrf, id | ID: 36
Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38
Description: Detects classic SQL injection probings 2/2 | Tags: sqli, id, lfi | ID: 43
Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68
Variable: POST.t_FriendRequest_Body | Value: <html>
<body style=\"font: 12px Verdana; color:#000000\">
<p><b>Dear <Recipient></b>,</p>
<br />
<p><a href=\"<SenderLink>\"><Sender></a> is inviting you to be friends. To accept/reject his/her invitation please
follow this <a href=\"<RequestLink>\">link</a></p>
<br />
<p><b>Thank you for using our services!</b></p>
<p>--</p>
<p style=\"font: bold 10px Verdana; color:red\"><SiteName> mail delivery system!!!
<br />Auto-generated e-mail, please, do not reply!!!</p>
</html>
Impact: 43 | Tags: xss, csrf, rfe, id, lfi, sqli
Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: finds malicious attribute injection attempts | Tags: xss, csrf | ID: 69
Description: Detects data: URL injections, VBS injections and common URI schemes | Tags: xss, rfe | ID: 27
Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33
Description: Detects common comment types | Tags: xss, csrf, id | ID: 35
Description: Detects comments to exploit firefox' faulty rendering and proprietary opera attacks | Tags: xss, csrf, id | ID: 36
Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38
Description: Detects classic SQL injection probings 2/2 | Tags: sqli, id, lfi | ID: 43
Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68
REMOTE_ADDR: xxxxx
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:
SCRIPT_FILENAME: /administration/email_templates.php
QUERY_STRING:
REQUEST_URI: /administration/email_templates.php
QUERY_STRING:
SCRIPT_NAME: /administration/email_templates.php
PHP_SELF: /administration/email_templates.php