source: https://www.securityfocus.com/bid/20137/info
Grayscale BandSite CMS is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.
These issues may allow an attacker to access sensitive information, execute arbitrary server-side script code in the context of the affected webserver, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could help the attacker steal cookie-based authentication credentials; other attacks are possible.
Version 1.1.0 is vulnerable; other versions may also be affected.
http://www.example.com/includes/footer.php?this_year=<script>alert(document.cookie);</script>
{"lastseen": "2020-04-01T19:04:06", "references": [], "description": "\nBandSite CMS 1.1 - footer.php Cross-Site Scripting", "edition": 1, "reporter": "HACKERS PAL", "exploitpack": {"type": "webapps", "platform": "php"}, "published": "2006-09-21T00:00:00", "title": "BandSite CMS 1.1 - footer.php Cross-Site Scripting", "type": "exploitpack", "enchantments": {"dependencies": {"references": [], "modified": "2020-04-01T19:04:06", "rev": 2}, "score": {"value": -0.1, "vector": "NONE", "modified": "2020-04-01T19:04:06", "rev": 2}, "vulnersScore": -0.1}, "bulletinFamily": "exploit", "cvelist": [], "modified": "2006-09-21T00:00:00", "id": "EXPLOITPACK:EA359C7E2543487CD9569B468244FEC1", "href": "", "viewCount": 1, "sourceData": "source: https://www.securityfocus.com/bid/20137/info\n \nGrayscale BandSite CMS is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.\n \nThese issues may allow an attacker to access sensitive information, execute arbitrary server-side script code in the context of the affected webserver, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could help the attacker steal cookie-based authentication credentials; other attacks are possible.\n \nVersion 1.1.0 is vulnerable; other versions may also be affected.\n\nhttp://www.example.com/includes/footer.php?this_year=<script>alert(document.cookie);</script>", "cvss": {"score": 0.0, "vector": "NONE"}}