header-logo
Suggest Exploit
vendor:
DasBlog
by:
Unknown
7.5
CVSS
HIGH
HTML injection
79
CWE
Product Name: DasBlog
Affected Version From: 1.3
Affected Version To: 1.6
Patch Exists: NO
Related CWE: Unknown
CPE: a:dasblog_project:dasblog
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

HTML injection vulnerability in DasBlog

DasBlog is susceptible to an HTML injection vulnerability in its request log. This vulnerability allows an attacker to inject malicious HTML and script code into the application, which can be executed within the browser of an administrator displaying the 'Activity and Events Viewer' in the context of the vulnerable site. This can lead to the theft of cookie-based authentication credentials and other possible attacks.

Mitigation:

It is recommended to sanitize user-supplied input data before using it in the generation of dynamic web pages to prevent HTML injection vulnerabilities. Applying security updates or patches from the vendor is also advised.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11086/info

DasBlog is reportedly susceptible to an HTML injection vulnerability in its request log. This vulnerability is due to a failure of the application to properly sanitize user-supplied input data before using it in the generation of dynamic web pages.

This may allow an attacker to inject malicious HTML and script code into the application. An administrator displaying the 'Activity and Events Viewer' will have the attacker-supplied script code executed within their browser in the context of the vulnerable site. This issue may be leverage to steal cookie based authentication credentials. Other attacks are also possible.

Although this issue reportedly affects versions 1.3 through 1.6 of the affected software. 

GET / HTTP/1.1
User-Agent: <script>alert('xss')</script>
Host: www.example.com
Accept: */*