Exploit Insanely Simple Blog 0.4/0.5 - Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
30318
Проверка EDB
  1. Пройдено
Автор
JOSEPH.GIRON13
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2007-3888
Дата публикации
2007-07-17
Код:
source: https://www.securityfocus.com/bid/24934/info
 
Insanely Simple Blog is prone to multiple input-validation vulnerabilities, including cross-site scripting, HTML-injection, and SQL-injection issues, because the application fails to properly sanitize user-supplied input.
 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, execute arbitrary script code in the context of the webserver process, steal cookie-based authentication credentials, compromise the application, obtain sensitive information, access or modify data, or exploit latent vulnerabilities in the underlying database.
 
Insanely Simple Blog 0.5 and prior versions are vulnerable. 

<B onmousemver="javascript:alert('lol')">Pizza pie</B>
<OL onmouseover="alert('lol')">I like it</OL>
 
Источник
www.exploit-db.com

Похожие темы