Lucene search

K
seebugRootSSV:75233
HistoryJul 01, 2014 - 12:00 a.m.

Philip Chinery's Guestbook 1.1 Script Injection Vulnerability

2014-07-0100:00:00
Root
www.seebug.org
10

No description provided by source.


                                                source: http://www.securityfocus.com/bid/4566/info

Philip Chinery's Guestbook is freely available guestbook software. It will run on most Unix and Linux variants, as well as Microsoft Windows operating systems.

Philip Chinery's Guestbook does not filter script code from form fields. As a result, it is possible for an attacker to inject script code into pages that are generated by the guestbook. Additionally, script code is not filitered from URL parameters, making the guestbook prone to cross-site scripting attacks.

This issue has been reported for Philip Chinery's Guestbook version 1.1. Other versions may also be affected.

http://[target]/cgi-bin/guestbook.pl?action=sign&cwrite=none&Name=<script>alert("gotcha!");</script>&[email protected]&Text=css%20exam
ple