Maran Blog XSS vulnerability

Credit: ls calima
Risk: Low
Local: No
Remote: Yes

CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Application: Maran Blog Web Site: Versions: no Version numbers could be found. Platform: linux, windows, freebsd, sun Bug: Cross site Scripting (XSS) Fix Available: Yes Advisory File: ------------------------------------------------------- 1) Introduction 2) Bug 3) The Code 4) Fix 5) About Serapis 6) Disclaimer =========== 1) Introduction =========== "This script is simple blog in flat file txt, not using mySQL DB. Have archive, search, mesajes" ====== 2) Bug ====== Cross Site Scripting. =============== 3) Proof of concept. =============== example: http://site/maranblog/comments.php?id=>'><ScRiPt%20%0a%0d>alert(49615986 1)%3B</ScRiPt> ===== 4) Fix ===== The Author fixed the problem, there are no version numbers availble. ============ 5) About ============ - is a portal dedicated to monitoring web defacements, tracking defacements around the world 24/7. serapis is the R&D Site of Secure Vision. ========== 6) Disclaimer ========== The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. - Web Site. - Web defacements blog. - SecureVision Web Site

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024,


Back to Top