[41045] in bugtraq
Zoomblog
BBCode Tag JavaScript Injection Vulnerability
daemon@ATHENA.MIT.EDU (sikikmail@gmail.com)
Sat Nov 5 15:14:01 2005
Date: 5 Nov 2005 10:26:06 -0000
Message-ID: <20051105102606.20602.qmail@securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: sikikmail@gmail.com
To: bugtraq@securityfocus.com
DETAILS
Zoomblog is prone to javascript injection attacks.
Zoomblog does not adequately filter <img> tags from various fields.
It is possible for a malicious Zoomblog user to inject hostile javascript code into the commentary via form fields. This code may be rendered in the browser of a web user who views the commentary of Zoomblog.
EXAMPLE
Write a comment with this code: <img src='javascript:void(0);' alt='' height=888888 width=888885 border=0>
EXPLOIT
There is no exploit required.
HOMEPAGE
http:/zoomblog.com