<<< Date Index >>>     <<< Thread Index >>>

phazizGuestbook v2.0 - XSS



phazizGuestbook v2.0


Homepage:
http://www.devhome.de/#english_version

Effected files:
input boxes of name, email, url, text.

XSS Vulnerability:
None of these input boxes sanatize user input before generating it. for PoC put 
<IMG SRC=javascript:alert(&#00000XSS')> in any of the above boxes.