Advertisement






SparkleBlog Journal.php HTML Injection Vulnerability =>v2.1 (all versions vulnerable)

CVE Category Price Severity
N/A CWE-79 N/A High
Author Risk Exploitation Type Date
Unspecified High Remote 2005-10-29
CPE
cpe:cpe:/a:sparkleblog-journal:sparkleblog-journal:2.1
CVSS EPSS EPSSP
CVSS:3.1/C:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H 0 0

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2005100064

Below is a copy:

SparkleBlog is prone to HTMl injection attacks. It is possible for a malicious SparkleBlog user to inject hostile HTML script code into the commentary via form fields. This code may be rendered in the browser of a web user who views the commentary of SparkleBlog.
SparkleBlog does not adequately filter HTMl tags from various fields. This may enable an attacker to inject arbitrary script code into pages that are generated by SparkleBlog 
example:
put <script>alert('test')</script> in the "name:" tag in http://localhost/journal.php?id=1

SparkleBlog home page: http://www.creamed-coconut.org/

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum