exploit-db-mirror/exploits/php/webapps/22163.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

11 lines
No EOL
722 B
Text

source: https://www.securityfocus.com/bid/6601/info
The Geeklog 'profiles.php' script is prone to multiple cross-site scripting vulnerabilities.
This issue is due to insufficient sanitization of input submitted in URI parameters. As a result, an attacker may create a malicious link to a site hosting Geeklog, which contains malicious HTML or script code.
When such a link is visited by an unsuspecting user, attacker-supplied script code will be interpreted by their web client.
http://www.example.com/profiles.php?uid=<script>alert(document.cookie)</script>
http://www.example.com//profiles.php?what=contact&author=ich&authoremail=bla%40bla.com&subject=hello&message=text&uid=<script>alert(document.cookie)</script>