No description provided by source.
source: http://www.securityfocus.com/bid/4969/info Geeklog does not filter script code from URL parameters, making it prone to cross-site scripting attacks. Attacker-supplied script code may be included in a malicious link to the 'index.php' or 'comment.php' script. Such a malicious link might be included in a HTML e-mail or on a malicious webpage. This may enable a remote attacker to steal cookie-based authentication credentials from legitimate users of a host running Geeklog. This issue has been reported to exist in Geeklog 1.3.5, earlier versions may also be susceptible to this issue. /index.php?topic=<script>alert(document.cookie)</script> /comment.php?mode=display&sid=foo&pid=18&title=<script>alert(document.cookie)</script>&type=article