header-logo
Suggest Exploit
vendor:
Geeklog
by:
SecurityFocus
7.5
CVSS
HIGH
Cross Site Scripting
79
CWE
Product Name: Geeklog
Affected Version From: 1.3.2006
Affected Version To: 1.3.2006
Patch Exists: YES
Related CWE: CVE-2002-1390
CPE: o:geeklog:geeklog
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2002

Cross Site Scripting Vulnerability in Geeklog

Geeklog does not properly sanitize user supplied input before being included when posting comments or writing stories. It is possible for an attacker to include malicious HTML code using the HTML attributes, which can be used to steal cookies, hijack sessions, or redirect users to malicious sites.

Mitigation:

Ensure that user supplied input is properly sanitized before being included in the output.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/5270/info

A cross site scripting vulnerability has been reported for Geeklog. Reportedly, Geeklog does not properly sanitize user supplied input before being included when posting comments or writing stories.

Geeklog makes efforts to sanitize some malicious user supplied input by stripping out HTML elements that are used for scripting. However, Geeklog does not properly remove HTML attributes that are used for the same purpose. 

It is possible for an attacker to include malicious HTML code using the HTML attributes. As an example, if an attacker were to supply malicious HTML code as part of an onMouseOver JavaScript event, the malicious code would not be properly sanitized.

<b onMouseOver="self.location.href='http://localhost/geeklog/'">