exploit-db-mirror/exploits/php/webapps/23192.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

7 lines
No EOL
652 B
Text

source: http://www.securityfocus.com/bid/8717/info
It has been reported that one of the scripts included with GuppY is vulnerable to an HTML injection attack. The script, "postguest.php", does not perform input validation to prevent the inclusion of HTML/script content in messages posted to the portal by remote clients. The flaw is present in the implementation of the "[c]" tag, which can be used by users posting messages in the forum or in the guestbook components of GuppY portals.
The vendor is aware of the vulnerability and has released an updated version, 2,4p1, that eliminates the issue.
[c=expression(alert('unsecure'))]texte[/c]