header-logo
Suggest Exploit
vendor:
TSguestbook
by:
Zone-h Security Team
7.5
CVSS
HIGH
HTML Injection
79
CWE
Product Name: TSguestbook
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

TSguestbook HTML Injection Vulnerability

TSguestbook is prone to HTML injection attacks due to insufficient sanitization of user-supplied input within the 'message' field. An attacker may post a guestbook entry including malicious HTML or script code within the said field, which could result in the execution of arbitrary code within the browser of an unsuspecting guestbook user.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/8520/info

It has been reported that TSguestbook may be prone to HTML injection attacks. The problem is said to occur due to insufficient sanitization of user-supplied input within the 'message' field. As a result, an attacker may post a guestbook entry including malicious HTML or script code within the said field. This could result in the execution of arbitrary code within the browser of an unsuspecting guestbook user. 

Name: Zone-h Security Team

Email: test@test.com

ICQ: 11111111

Homepage: http://www.zone-h.org

Message:<script>alert('Zone-H')</script>