TUCoPS :: Web :: Guestbooks :: b06-2006.htm

CuteGuestbook XSS attack
CuteGuestbook XSS attack
CuteGuestbook XSS attack



------------------------------------------------------------------=0D
          - Cute Guestbook Remote XSS Exploit -=0D
-= http://colander.altervista.org/advisory/CuteGuestbook.txt =-=0D 
------------------------------------------------------------------=0D
=0D
			-= Cute Guestbook =-=0D
=0D
=0D
=0D
Omnipresent=0D
May 04, 2006=0D
=0D
=0D
Vunerability(s):=0D
----------------=0D
XSS Exploit=0D
=0D
=0D
Product:=0D
--------=0D
Cute Guestbook=0D
=0D
Vendor:=0D
--------=0D
http://www.scriptsez.net/index.php?action=detail&id=1086399301=0D 
=0D
=0D
Description of product:=0D
-----------------------=0D
=0D
PHP based guestbook requires no configuration and no database. Features: Bad words filter, number of messages per page, =0D
total messages to keep in record, emoticons with comments and much more.=0D
=0D
Platform(s):  	linux, windows=0D
Date Added: 	Jun 5, 2004=0D
Last Updated: 	Feb 11, 2006=0D
Author: 	Scriptsez Inc.=0D
=0D
=0D
Vulnerability / Exploit:=0D
------------------------=0D
=0D
The applications Cute Guestbook is vulnerable to an XSS (Cross-Site Scripting) Attack.=0D
=0D
PoC / Proof of Concept:=0D
-----------------------=0D
=0D
An attacker can go to this URL:=0D
=0D
http://www.victim_host/[path]/guestbook.php?action=sign=0D 
=0D
or=0D
=0D
http://www.victim_host/[path]/guestbook.php=0D 
=0D
and then click on:=0D
=0D
Click here to sign our Guestbook=0D
=0D
Then insert in the field Name the Nick and in the field Comments put XSS like:=0D
=0D
=0D
=0D
=0D
Additional Informations:=0D
------------------------=0D
=0D
google dorks: "Powered By:Cute Guestbook"=0D
=0D
Vendor Status=0D
-------------=0D
=0D
Not informed!=0D
=0D
Credits:=0D
--------=0D
omnipresent=0D
omnipresent@email.it 

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH