MJGUEST 'guestbook.js.php' Cross Site Scripting Vulnerability
BID:30438
Info
MJGUEST 'guestbook.js.php' Cross Site Scripting Vulnerability
| Bugtraq ID: | 30438 |
| Class: | Input Validation Error |
| CVE: |
CVE-2008-3404 |
| Remote: | Yes |
| Local: | No |
| Published: | Jul 30 2008 12:00AM |
| Updated: | May 07 2015 05:25PM |
| Credit: | Digital Security Research Group [DSecRG] |
| Vulnerable: |
MJGUEST MJGUEST 6.8 GT |
| Not Vulnerable: |
MJGUEST MJGUEST 6.8 GT rev 2 |
Discussion
MJGUEST 'guestbook.js.php' Cross Site Scripting Vulnerability
MJGUEST is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
MJGUEST 6.8 GT is vulnerable; other versions may also be affected.
MJGUEST is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
MJGUEST 6.8 GT is vulnerable; other versions may also be affected.
Exploit / POC
MJGUEST 'guestbook.js.php' Cross Site Scripting Vulnerability
Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI.
The following example URI is available:
http://www.example.com/guestbook.js.php?link=[XSS]
Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI.
The following example URI is available:
http://www.example.com/guestbook.js.php?link=[XSS]
Solution / Fix
MJGUEST 'guestbook.js.php' Cross Site Scripting Vulnerability
Solution:
The vendor released an update to address this issue. Please see the references for more information.
Solution:
The vendor released an update to address this issue. Please see the references for more information.
References
MJGUEST 'guestbook.js.php' Cross Site Scripting Vulnerability
References:
References: