header-logo
Suggest Exploit
vendor:
MyGuestBK Information Server
by:
SecurityFocus
4.3
CVSS
MEDIUM
Cross-site Scripting (XSS)
79
CWE
Product Name: MyGuestBK Information Server
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

MyGuestBK Information Server ‘Add Entry’ page Vulnerability

It has been reported that MyGuestBK does not sufficiently filter user-supplied URI parameters on the MyGuestBK Information Server 'Add Entry' page. It may be possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of a legitimate user. This may allow for theft of cookie-based authentication credentials and other attacks.

Mitigation:

Input validation should be used to ensure that user-supplied data does not contain malicious code.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/7211/info

It has been reported that MyGuestBK does not sufficiently filter user-supplied URI parameters on the MyGuestBK Information Server 'Add Entry' page.

It may be possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of a legitimate user.

This may allow for theft of cookie-based authentication credentials and other attacks. 

http://www.example.com/myguestBk/add1.asp?name=Name&subject=Subj&email=M@IL&message=<script>alert ("Test!")</script>