CVE-2007-4711
Toms Gaestebuch 1.00 - Cross-Site Scripting via Multiple Parameters
Title source: llmExploitation Summary
EIP tracks 2 public exploits for CVE-2007-4711. PoCs published by cod3in.
AI-analyzed exploit summary The provided text describes a cross-site scripting (XSS) vulnerability in Toms Gästebuch versions prior to 1.01. It outlines how an attacker can exploit unsanitized user input in the 'homepage', 'mail', and 'name' parameters to execute arbitrary script code in a user's browser context.
Description
Multiple cross-site scripting (XSS) vulnerabilities in Toms Gaestebuch 1.00 allow remote attackers to inject arbitrary web script or HTML via the (1) homepage, (2) mail, and (3) name parameters in a show action to (a) form.php; the (4) language and (5) anzeigebreite parameters to (b) admin/header.php; and the (6) msg parameter to (c) install.php, different vectors than CVE-2006-0706.
Exploits (2)
The provided text describes a cross-site scripting (XSS) vulnerability in Toms Gästebuch versions prior to 1.01. It outlines how an attacker can exploit unsanitized user input in the 'homepage', 'mail', and 'name' parameters to execute arbitrary script code in a user's browser context.
The provided text describes a cross-site scripting (XSS) vulnerability in Toms Gästebuch versions prior to 1.01. It outlines the vulnerability's impact and provides an example URL demonstrating the issue.