10 lines
No EOL
780 B
Text
10 lines
No EOL
780 B
Text
source: https://www.securityfocus.com/bid/4969/info
|
|
|
|
Geeklog does not filter script code from URL parameters, making it prone to cross-site scripting attacks. Attacker-supplied script code may be included in a malicious link to the 'index.php' or 'comment.php' script. Such a malicious link might be included in a HTML e-mail or on a malicious webpage.
|
|
|
|
This may enable a remote attacker to steal cookie-based authentication credentials from legitimate users of a host running Geeklog.
|
|
|
|
This issue has been reported to exist in Geeklog 1.3.5, earlier versions may also be susceptible to this issue.
|
|
|
|
/index.php?topic=<script>alert(document.cookie)</script>
|
|
/comment.php?mode=display&sid=foo&pid=18&title=<script>alert(document.cookie)</script>&type=article |