header-logo
Suggest Exploit
vendor:
phpWebSite
by:
SecurityFocus
7.5
CVSS
HIGH
Cross-site Scripting
79
CWE
Product Name: phpWebSite
Affected Version From: 2000.8.2
Affected Version To: 2000.8.2
Patch Exists: YES
Related CWE: CVE-2002-1390
CPE: a:phpwebsite:phpwebsite:0.8.2
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2002

Problems with phpWebSite

phpWebSite does not sufficiently filter potentially malicious HTML code from news posts, allowing an attacker to inject malicious JavaScript code into a news post. When a user views the post, the code is executed in the browser of the vulnerable user.

Mitigation:

Filter user input for malicious HTML code.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/5802/info

Problems with phpWebSite could make it possible to execute arbitrary script code in a vulnerable client.

phpWebSite does not sufficiently filter potentially malicious HTML code from news posts. As a result, when a user views a news posting that contains malicious HTML code, the code contained in the posted message would be executed in the browser of the vulnerable user. This will occur in the context of the site running the phpWebSite software. 

<IMG SRC="javascript:alert('unsecure')">