Boastmachine Cross Site Scripting Vulnerability

Risk: Low
Local: No
Remote: Yes

CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Advisory : Cross Site Scripting in Boastmachine ( Release Date : 17/05/2005 Last Modified : 17/05/2005 Author : Yunus Emre Yilmaz ( Application : BoastMachine v3.1 ( maybe older versions) Risk : High Problem : Form action values in admin.php and index.php (maybe other pages) isn't properly sanitized before being returned to page.Form action value is otomatically coming from $_SERVER["PHP_SELF"];.And This is changeable from query string. If I access page like admin.php/XSS $_SERVER["PHP_SELF"] returns as admin.php/XSS.So , an attacker basicly inject malicious HTML/JS codes into page. Proof Of Concept : admin.php/"><script>alert('xss')</script> Solution : Edit the source code , and change it $_SERVER["SCRIPT_NAME"] or filter it before printing in page. Original Advisory :

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020,


Back to Top