Insanely Simple Blog 0.4/0.5 - Cross-Site Scripting

Author: joseph.giron13
type: webapps
platform: php
port: 
date_added: 2007-07-17  
date_updated: 2016-12-07  
verified: 1  
codes: CVE-2007-3888;OSVDB-38210  
tags:   
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.cominsanely_simple_blog0.5.zip  

raw file: 30318.txt  
source: https://www.securityfocus.com/bid/24934/info

Insanely Simple Blog is prone to multiple input-validation vulnerabilities, including cross-site scripting, HTML-injection, and SQL-injection issues, because the application fails to properly sanitize user-supplied input.

Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, execute arbitrary script code in the context of the webserver process, steal cookie-based authentication credentials, compromise the application, obtain sensitive information, access or modify data, or exploit latent vulnerabilities in the underlying database.

Insanely Simple Blog 0.5 and prior versions are vulnerable.

<B onmousemver="javascript:alert('lol')">Pizza pie</B>
<OL onmouseover="alert('lol')">I like it</OL>