Philip Chinery's Guestbook 1.1 - Script Injection



EKU-ID: 26913 CVE: CVE-2002-0730;OSVDB-8395 OSVDB-ID:
Author: markus arndt Published: 2002-04-21 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


source: https://www.securityfocus.com/bid/4566/info

Philip Chinery's Guestbook is freely available guestbook software. It will run on most Unix and Linux variants, as well as Microsoft Windows operating systems.

Philip Chinery's Guestbook does not filter script code from form fields. As a result, it is possible for an attacker to inject script code into pages that are generated by the guestbook. Additionally, script code is not filitered from URL parameters, making the guestbook prone to cross-site scripting attacks.

This issue has been reported for Philip Chinery's Guestbook version 1.1. Other versions may also be affected.

http://[target]/cgi-bin/guestbook.pl?action=sign&cwrite=none&Name=<script>alert("gotcha!");</script>&EMail=example@example.com&Text=css%20exam
ple