OOApp Guestbook Multiple HTML Injection Vulnerabilities
BID:12647
Info
OOApp Guestbook Multiple HTML Injection Vulnerabilities
| Bugtraq ID: | 12647 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 24 2005 12:00AM |
| Updated: | Feb 24 2005 12:00AM |
| Credit: | Discovery of this vulnerability is credited to m1o1d1, MicMast and Urthogie. |
| Vulnerable: |
OOApp Guestbook |
| Not Vulnerable: | |
Discussion
OOApp Guestbook Multiple HTML Injection Vulnerabilities
OOApp Guestbook is reportedly affected by multiple HTML injection vulnerabilities. These issues occur because the application fails to properly sanitize user-supplied input.
The attacker-supplied HTML and script code would be able to access properties of the site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user, other attacks are also possible.
OOApp Guestbook is reportedly affected by multiple HTML injection vulnerabilities. These issues occur because the application fails to properly sanitize user-supplied input.
The attacker-supplied HTML and script code would be able to access properties of the site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user, other attacks are also possible.
Exploit / POC
OOApp Guestbook Multiple HTML Injection Vulnerabilities
No exploit is required.
The following proof of concept is available:
http://www.example.com/home.php?do=del;id=%31%27%3E%0A[Javascript]%31%27%3E%0A = 1'>
No exploit is required.
The following proof of concept is available:
http://www.example.com/home.php?do=del;id=%31%27%3E%0A[Javascript]%31%27%3E%0A = 1'>
Solution / Fix
OOApp Guestbook Multiple HTML Injection Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.