lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060306135800.10533.qmail@securityfocus.com> Date: 6 Mar 2006 13:58:00 -0000 From: sikik@...mail.org To: bugtraq@...urityfocus.com Subject: evoBlog Remote Name tag Script injection DESCRIPTION evoBlog is prone to HTML injection attacks. It is possible for a malicious evoBlog user to inject hostile HTML and script code into the commentary via form fields. This code may be rendered in the browser of a web user who views the commentary of evoBlog. evoBlog does not adequately filter HTML tags from various fields. This may enable an attacker to inject arbitrary script code into pages that are generated by the evoBlog. All versions are vulnerable. EXPLOIT Write and HTML script for example: <script>alert('test')</script> in the name tag. HOMEPAGE http://www.ajaxreview.com/