header-logo
Suggest Exploit
vendor:
BlogPHP
by:
Paul Maaouchy (Paulzz)
7.5
CVSS
HIGH
Cross-Site Scripting (XSS)
79
CWE
Product Name: BlogPHP
Affected Version From: v2
Affected Version To: v2
Patch Exists: NO
Related CWE: N/A
CPE: a:blogphp:blogphp:2.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011

BlogPHP v2 – XSS

BlogPHP v2 is vulnerable to Cross-Site Scripting (XSS). An attacker can inject malicious JavaScript code into the Username field of the register.html page. When a user visits the members.html page, the malicious code will be executed in the user's browser. This can be used to redirect the user to a malicious website or to exploit the user's browser.

Mitigation:

Input validation should be used to prevent malicious code from being injected into the Username field.
Source

Exploit-DB raw data:

# Exploit Title: BlogPHP v2 - XSS
# Google Dork: "Copyright ©2006 Powered by www.blogphp.net"
# Date: 09/08/2011
# Author: Paul Maaouchy( Paulzz )
# Software Link: http://sourceforge.net/projects/blogphpscript/files/blogphpscript/2.0/BlogPHPv2.zip/download
# Version: v2
# Tested on: 
# CVE : 
How to exploit:
1- Go there : http://localhost/blogphp/register.html.
2- Put in the Username field the XSS Code.  Example:<META http-equiv="refresh" content="0;URL=http://www.google.com">  .
3- Put anything in the other field ( Password & E-mail).
4- Now anyone go there : http://localhost/blogphp/members.html will redirected to google.com OR exploit your XSS Code.

Paul Maaouchy ( Paulzz )
Contact me 
@ spy.xp@hotmail.com
@ paul.maaouchy@gmail.com
@ paulmeouchi@paulmeouchi.com