Lucene search

K
seebugRootSSV:75623
HistoryJul 01, 2014 - 12:00 a.m.

Lycos HTMLGear guestGear CSS HTML Injection Vulnerability

2014-07-0100:00:00
Root
www.seebug.org
11

No description provided by source.


                                                source: http://www.securityfocus.com/bid/5728/info

Lycos htmlGEAR guestGEAR does not sanitize HTML from CSS (Cascading Style-Sheets) elements in guestbook fields. An attacker could capitalize on this situation to include arbitrary HTML and script code in a guestbook entries, which would be rendered in the web client of users who view the malicious guestbook entry.

Code injected in this manner will be executed in the security context of the website hosting the guestbook. 

It has also been reported that it is possible, in some versions of the software, to inject HTML into image tags.

By specifying an e-mail address/web page URL like the following:

" STYLE="expression([javascript])

The JavaScript block will execute. Some less-paranoid versions of the
guestbook also allow a typical IMG attack:

<IMG SRC="javascript:[javascript]">