CGI-City's CCGuestBook Script Injection Vulns

2008.04.04
Credit: BrainRawt
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

CGI-City's CCGuestBook Script Injection Vulnerabilities Discovered By BrainRawt (brainrawt (at) hotmail (dot) com [email concealed]) About CCGuestBook: ------------------ CC Guestbook is a simple guestbook program that is very easy to configure and install. It features a notification facility which sends an email alert to the guestbook owner whenever new entries are made. It may also be used as a post-it board to allow visitors to a web site to just post messages. CCGuestBook can be downloaded from the following address. http://www.icthus.net/CGI-City/scr_cgicity.shtml#CCGUEST Vendor Contact: ---------------- 1-30-03 Emailed cgicity (at) icthus (dot) net [email concealed] No Response Vulnerability: ---------------- cc_guestbook.pl neglects filtering user input allowing for script injection to the guestbook via "name" and "webpage title". The injected script will be executed in anyones browser who visits the guestbook. Exploit (POC): ---------------- <script>alert('obvious?')</script> _________________________________________________________________ Protect your PC - get McAfee.com VirusScan Online http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top