vendor:
phpLinks
by:
SecurityFocus
7.5
CVSS
HIGH
HTML Injection
79
CWE
Product Name: phpLinks
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002
phpLinks HTML Injection Vulnerability
phpLinks does not sufficiently sanitize HTML and script code supplied via form fields before displaying this data to administrative users. This issue exists in the 'add.php' script, which is used to add sites to the phpLinks system. As a result, an attacker may cause malicious HTML and script code to be executed in the web client of an administrative user who reviews attacker-supplied data submitted when a site is added. An attacker can inject code into the Site Title or Site Url field, which will be executed as soon as a logged in administrator views it. The code can be used to delete the database, add users to the database, and more.
Mitigation:
Input validation should be used to ensure that user-supplied data is properly sanitized before being displayed to administrative users.