Bug: vlbook 1.2 XSS Bug ( Ascii Version )

Search:
WLB2

vlbook 1.2 XSS Bug

Published
Credit
Risk
2006.06.29
omnipresent
Low
CWE
CVE
Local
Remote
CWE-79
CVE-2006-3260
No
Yes

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None

vlBook 1.02 Advisory

====================

Date:

-----

2005 June 23

Product:

--------

vlBook 1.02 © 2005

Vendor:

-------

http://vlab.info/

Descriptions:

-------------

The vlbook is a free, open source and light-weight guestbook written in PHP using flat files to store messages

and settings. It comes with install script for quick and effortless installation. Features include a WYSIWYG Editor,

template based skins, multilingual support, avatars packs and more.

Exploit(s)/Vulnerability(ies):

------------------------------

- XSS Vulnerability -

This product is vulnerable to an XSS Attack. The variable message is not properly sanitised before being used; so a
malicious

people can inject arbitrary XSS code.

PoC 0f XSS:

-----------

If an attacker put in the field "Message*:" this code:

<script>alert("XSS ATTACK")</script>

Further information:

--------------------

googledorks: Powered by vlBook 1.02 &#169; 2005

Vendor Status:

--------------

Informed but I've not received the reply.

Credits:

--------

Omnipresent

omnipresent (at) email (dot) it [email concealed]

See this note in TXT Version

Bugtraq RSS
Bugtraq
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn
 
CVE RSS
CVEMAP

Copyright 2014, cxsecurity.com
Ascii Version