Hot Links Lite version 1.0 suffers from cross site scripting vulnerabilities.
896c4311e45250f2be0e365c1fd67008be14722836c3b2d937057d653cb1053e
New eVuln Advisory:
url XSS in Hot Links Lite
http://evuln.com/vulns/142/summary.html
-----------Summary-----------
eVuln ID: EV0142
Software: Hot Links Lite
Vendor: Mrcgiguy
Version: 1.0
Critical Level: low
Type: Cross Site Scripting
Status: Unpatched. No reply from developer(s)
PoC: Available
Solution: Not available
Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ )
--------Description--------
XSS vulnerability found in url parameter of process.cgi script. This can be used to insert any script code. Admin panel is vulnerable also.
--------PoC/Exploit--------
url XSS vulnerability
Parameter url doesn't pass any sanitation for XSS.
XSS Example 1
URL: javascript:[XSS]
XSS Example 2
URL: "><XSS>
---------Solution----------
Not available
----------Credit-----------
Vulnerability discovered by Aliaksandr Hartsuyeu
http://evuln.com/tool/xss-encoder.html - XSS String Encoder