9 lines
No EOL
574 B
Text
9 lines
No EOL
574 B
Text
source: https://www.securityfocus.com/bid/6603/info
|
|
|
|
Geeklog is prone to a cross-site scripting vulnerability in the 'comment.php' script.
|
|
|
|
This issue is due to insufficient sanitization of input submitted in URI parameters. As a result, an attacker may create a malicious link to a site hosting Geeklog, which contains malicious HTML or script code.
|
|
|
|
When such a link is visited by an unsuspecting user, attacker-supplied script code will be interpreted by their web client.
|
|
|
|
http://www.example.com//comment.php?mode=Delete&sid=1&cid=<script>alert(document.cookie)</script> |