Vulnerabilities > CVE-2006-1256 - HTML Injection vulnerability in Skullsplitter PHP Guestbook 2.7
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
NONE Integrity impact
PARTIAL Availability impact
NONE Summary
Cross-site scripting (XSS) vulnerability in guestbook.php in Soren Boysen (SkullSplitter) PHP Guestbook 2.6 allows remote attackers to inject arbitrary web script or HTML via the url parameter. This vulnerability can only be exploited if the "magic_quotes_gpc" parameter is set to 'off'.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Packetstorm
data source | https://packetstormsecurity.com/files/download/45094/EV0104.txt |
id | PACKETSTORM:45094 |
last seen | 2016-12-05 |
published | 2006-04-01 |
reporter | Aliaksandr Hartsuyeu |
source | https://packetstormsecurity.com/files/45094/EV0104.txt.html |
title | EV0104.txt |
References
- http://attrition.org/pipermail/vim/2006-March/000613.html
- http://evuln.com/vulns/104/summary.html
- http://secunia.com/advisories/19268
- http://securityreason.com/securityalert/650
- http://www.boysen.be/en/
- http://www.osvdb.org/23941
- http://www.securityfocus.com/archive/1/429254/100/0/threaded
- http://www.securityfocus.com/bid/17136
- http://www.vupen.com/english/advisories/2006/0974
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25293