Atom Photoblog 1.0.1/1.0.9 - 'AtomPhotoblog.php' Multiple Input Validation Vulnerabilities
Author: Serapis.net
type: webapps
platform: php
port:
date_added: 2007-06-07
date_updated: 2016-12-21
verified: 1
codes: CVE-2007-3134;OSVDB-37046
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comatomphotoblogV1.0.9.1.zip
source: https://www.securityfocus.com/bid/24363/info
Atom PhotoBlog is prone to multiple input-validation vulnerabilities because it fails to adequately sanitize user-supplied input data before rendering it in a user's browser. These issues include multiple HTML-injection vulnerabilities and a cross-site scripting vulnerability.
Attackers could exploit these issues to steal cookie-based authentication credentials from legitimate users of the site; other attacks are also possible.
Versions prior to Atom PhotoBlog 1.0.9.1 are vulnerable.
http://www.example.com/atomphotoblog/atomPhotoBlog.php?do=index&tag=<ScRiPt%20%0a%0d>alert(1566213939)%3B</ScRiPt>