AxsLinks version 0.3 suffers from a cross site scripting vulnerability.
0dbc500223d6ff467e80de7a95318ddf7c764d4fb22745a3b905941fb8fb7989
New eVuln Advisory:
URL and Title XSS in AxsLinks
http://evuln.com/vulns/139/summary.html
-----------Summary-----------
eVuln ID: EV0139
Software: AxsLinks
Vendor: AXScripts
Version: 0.3
Critical Level: medium
Type: Cross Site Scripting
Status: Unpatched. No reply from developer(s)
PoC: Not available
Not available
Solution: Available
Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ )
--------Description--------
User-defined parameters "url" and "title" (script "addlink.php") are not properly sanitized. XSS is possibl.
--------PoC/Exploit--------
1. Exploit code for XSS in URL recip link.
URL recip link: http://valid link/"<XSS>
2. Exploit code for XSS in Link Title.
Link Title: <XSS>
---------Solution----------
Available at http://evuln.com/vulns/139/solution.html
----------Credit-----------
Vulnerability discovered by Aliaksandr Hartsuyeu
http://evuln.com/tool/php-security.html - PHP sources Online Analyzer