header-logo
Suggest Exploit
vendor:
Geeklog
by:
SecurityFocus
8.8
CVSS
HIGH
HTML Injection
79
CWE
Product Name: Geeklog
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

Geeklog HTML Injection Vulnerabilities

Geeklog is prone to multiple HTML Injection vulnerabilities due to a lack of sufficient sanitization performed on data that is parsed from forum interface form fields. An attacker with sufficient privileges to create a forum post may use the forum form fields as a conduit to inject malicious HTML and script code into dynamic Geeklog content. The malicious HTML may be rendered in the browser of an unsuspecting user who views the malicious post, leading to code execution in the context of the affected site.

Mitigation:

Ensure that user-supplied input is properly sanitized before being parsed and rendered.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/8792/info

Geeklog has been reported prone to multiple HTML Injection vulnerabilities.

The issues have been reported to present themselves due to a lack of sufficient sanitization performed on data that is parsed from forum interface form fields. It has been reported that an attacker, who has sufficient privileges to create a forum post, may use the forum form fields as a conduit to inject malicious HTML and script code into dynamic Geeklog content.

The malicious HTML may be rendered in the browser of an unsuspecting user who views the malicious post. Code execution will occur in the context of the affected site. 

<img src="javascript:alert()">

<b style="background-image: url(javascript:alert(document))">test</b>