Zoomblog vulnerable to javascript injection via <img> tag
`DETAILS
Zoomblog is prone to javascript injection attacks.
Zoomblog does not adequately filter <img> tags from various fields.
It is possible for a malicious Zoomblog user to inject hostile javascript code into the commentary via form fields. This code may be rendered in the browser of a web user who views the commentary of Zoomblog.
EXAMPLE
Write a comment with this code: <img src='javascript:void(0);' alt='' height=888888 width=888885 border=0>
EXPLOIT
There is no exploit required.
HOMEPAGE
http:/zoomblog.com
`
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo