Zoomblog <IMG> BBCode Tag JavaScript Injection Vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



DETAILS
Zoomblog is prone to javascript injection attacks. 
Zoomblog does not adequately filter <img> tags from various fields. 
It is possible for a malicious Zoomblog user to inject hostile javascript code into the commentary via form fields. This code may be rendered in the browser of a web user who views the commentary of Zoomblog.

EXAMPLE
Write a comment with this code: <img src='javascript:void(0);' alt='' height=888888 width=888885 border=0>


EXPLOIT
There is no exploit required.


HOMEPAGE
http:/zoomblog.com

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux