Lucene search

K

EV0137.txt

🗓️ 14 Sep 2006 00:00:00Reported by Aliaksandr HartsuyeuType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 18 Views

New eVuln Advisory: CJ Tag Board XSS Vulnerability, Vendor: CloudNin

Show more
Code
`New eVuln Advisory:  
CJ Tag Board XSS Vulnerability  
http://evuln.com/vulns/137/summary.html  
  
--------------------Summary----------------  
eVuln ID: EV0137  
Vendor: CloudNine Interactive  
Vendor's Web Site: http://www.cloudnineinteractive.co.uk/  
Software: Tag Board  
Sowtware's Web Site:  
http://www.cloudnineinteractive.co.uk/stuffforyou.htm  
Versions: 3.0  
Critical Level: Harmless  
Type: Cross-Site Scripting  
Class: Remote  
Status: Unpatched. No reply from developer(s)  
PoC/Exploit: Available  
Solution: Not Available  
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)  
  
-----------------Description---------------  
Cross-Site Scripting.   
  
Vulnerable Script: tag.php   
  
Parameter cjmsg is not properly sanitized. This can be used to post  
arbitrary HTML or web script code.   
  
  
  
--------------PoC/Exploit----------------------  
Available at: http://evuln.com/vulns/137/exploit.html  
  
  
Cross-Site Scripting Example.  
  
URL: http://host/index.php  
Message: [url=aaa.com" onmouseover="alert(123)" aa="]aaaa[/url]  
  
--------------Solution---------------------  
No Patch available.  
  
--------------Credit-----------------------  
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)  
  
  
Regards,  
Aliaksandr Hartsuyeu  
http://evuln.com - Penetration Testing Services  
.  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
14 Sep 2006 00:00Current
7.4High risk
Vulners AI Score7.4
18
.json
Report