Advanced Guestbook version 1.0 suffers from a cross site scripting flaw.
c19873d1074bd3250ddc2d4667a0eb32aba86a2570bb2de17caf5bba0b6c3f55
Advanced Guestbook v1.0
Homepage:
http://www.sport-slo.net/
Affected files:
guestbook.php
-----------------------------------------------
XSS vuln on guestbook.php:
Data isn't sanatized before being submit to guestbook.txt and displayed onscreen. The code:
if($_POST['action'])
{
if($_POST['name'] && $_POST['form'])
{
$action = $_POST['name'] . "@" . $_POST['form'] . "@" . $ip . "@" . $date . "\n";
$handler = fopen("guestbook.txt", "a");
fputs($handler, $action);
fclose($handler);
print "Thank you!";
For a PoC as your name or opinion put:
<script>alert('xss')</script>
It should also be noted that this script comes with the dir /guestbook/and inside that is the cjGuestbook v1.2. v1.3 (which is a newer version) of cj'sguestbook has XSS vulns which i've submitted before.