Sport-slo.net Guestbook v1.0

2006.07.14
Risk: Low
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 5.8/10
Impact Subscore: 4.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: None

Advanced Guestbook v1.0 Homepage: http://www.sport-slo.net/ Affected files: guestbook.php ----------------------------------------------- XSS vuln on guestbook.php: Data isn't sanatized before being submit to guestbook.txt and displayed onscreen. The code: if($_POST['action']) { if($_POST['name'] && $_POST['form']) { $action = $_POST['name'] . "@" . $_POST['form'] . "@" . $ip . "@" . $date . "n"; $handler = fopen("guestbook.txt", "a"); fputs($handler, $action); fclose($handler); print "Thank you!"; For a PoC as your name or opinion put: <script>alert('xss')</script> It should also be noted that this script comes with the dir /guestbook/and inside that is the cjGuestbook v1.2. v1.3 (which is a newer version) of cj'sguestbook has XSS vulns which i've submitted before.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top