TSguestbook 2.1 Message Field HTML Injection Vulnerability

ID EDB-ID:23084
Type exploitdb
Reporter Trash-80
Modified 2003-09-01T00:00:00


TSguestbook 2.1 Message Field HTML Injection Vulnerability. Webapps exploit for php platform

                                            source: http://www.securityfocus.com/bid/8520/info

It has been reported that TSguestbook may be prone to HTML injection attacks. The problem is said to occur due to insufficient sanitization of user-supplied input within the 'message' field. As a result, an attacker may post a guestbook entry including malicious HTML or script code within the said field. This could result in the execution of arbitrary code within the browser of an unsuspecting guestbook user. 

Name: Zone-h Security Team

Email: test@test.com

ICQ: 11111111

Homepage: http://www.zone-h.org