9 lines
No EOL
564 B
Text
9 lines
No EOL
564 B
Text
source: https://www.securityfocus.com/bid/6602/info
|
|
|
|
Geeklog is prone to a cross-site scripting vulnerability in the 'users.php' script.
|
|
|
|
This issue is due to insufficient sanitization of input submitted in URI parameters. As a result, an attacker may create a malicious link to a site hosting Geeklog, which contains malicious HTML or script code.
|
|
|
|
When such a link is visited by an unsuspecting user, attacker-supplied script code will be interpreted by their web client.
|
|
|
|
http://www.example.com/users.php?mode=profile&uid=<script>alert(document.cookie)</script> |