Exploit Geeklog 1.3.5 - HTML Attribute Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
21628
Проверка EDB
  1. Пройдено
Автор
ULF HARNHAMMAR
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
null
Дата публикации
2002-07-19
Код:
source: https://www.securityfocus.com/bid/5270/info

A cross site scripting vulnerability has been reported for Geeklog. Reportedly, Geeklog does not properly sanitize user supplied input before being included when posting comments or writing stories.

Geeklog makes efforts to sanitize some malicious user supplied input by stripping out HTML elements that are used for scripting. However, Geeklog does not properly remove HTML attributes that are used for the same purpose. 

It is possible for an attacker to include malicious HTML code using the HTML attributes. As an example, if an attacker were to supply malicious HTML code as part of an onMouseOver JavaScript event, the malicious code would not be properly sanitized.

<b onMouseOver="self.location.href='http://localhost/geeklog/'">
 
Источник
www.exploit-db.com

Похожие темы