Cross-site scripting (XSS) vulnerability in Chipmunk guestbook allows remote attackers to inject arbitrary web script or HTML via the (1) start parameter in (a) index.php; (2) forumID parameter in index.php, (b) newtopic.php, and (c) reply.php; and (3) ID parameter to (d) edit.php.
Link | Tags |
---|---|
http://packetstorm.linuxsecurity.com/0811-exploits/chipmunkguestbook-sqlxss.txt | |
http://www.securityfocus.com/archive/1/435306/100/0/threaded | mailing list |
http://osvdb.org/50345 | vdb entry |
http://www.securityfocus.com/archive/1/435196/100/0/threaded | mailing list |
http://securitytracker.com/id?1016182 | vdb entry |
http://securityreason.com/securityalert/1008 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26700 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26873 | vdb entry |
http://www.securityfocus.com/bid/18118 | vdb entry |