Bug: DGbook v1.0 - XSS ( Ascii Version )

Search:
WLB2

DGbook v1.0 - XSS

Published
Credit
Risk
2006.05.25
luny youfucktard com
Low
CWE
CVE
Local
Remote
CWE-79
CVE-2006-2572
No
Yes

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.6/10
2.9/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None

DGbook v1.0 - XSS

Homepage:

http://www.diangemilang.com/dgscripts.php

Description:

This is Guestbook script, write on PHP from Dian Gemilang. Feature: Field validation, Limit character, Charecter
filtering - This feature will remove "<" and ">" character, so user can't input HTML tag -,
Auto Focus - This feature will make user cursor on the first form field - It's easy to install. Requare PHP, MYQL and
phpmyadmin for dump the database.

Effected files:

Name, homepage, and address input boxes on index.php

XSS Vuln:

< and > may be filtered however, they are not filtered in the name, homepage and address text boxes. Only in the
comment box.

Example of putting html code in the name & address box:

<DIV STYLE="background-image: url(javascript:window.location('http://www.evilsite.com'))">

See this note in TXT Version

Bugtraq RSS
Bugtraq
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn
 
CVE RSS
CVEMAP

Copyright 2014, cxsecurity.com
Ascii Version