Description
Multiple cross-site scripting (XSS) vulnerabilities in Simple PHP Blog 0.4.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) entry, (2) blog_subject, and (3) blog_text parameters (involving the temp_subject variable) in (a) preview_cgi.php and (b) preview_static_cgi.php, or (4) scheme_name parameter and (5) bg_color parameters (involving the preset_name and result variables) in (c) colors.php.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
https://www.exploit-db.com/exploits/26462
exploitdb
WORKING POC
VERIFIED
https://www.exploit-db.com/exploits/26461
exploitdb
WORKING POC
VERIFIED
https://www.exploit-db.com/exploits/26463
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/415463
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/138
Vendor Advisory x_refsource_misc
http://www.seclab.tuwien.ac.at/advisories/TUVSA-0511-001.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/20436
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/20437
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/17404
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/20438
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/15283
Scores
EPSS
0.0363
EPSS Percentile
87.9%
Details
Status
published
Products (1)
alexander_palmo/simple_php_blog
0.4.5
Published
Nov 03, 2005
Tracked Since
Feb 18, 2026