CVE-2007-4896
Toms Gaestebuch <= 1.01 - Cross-Site Scripting via lang or einst Parameter
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2007-4896. PoCs published by hd1979.
AI-analyzed exploit summary The provided text describes a cross-site scripting (XSS) vulnerability in Toms Gastebuch, detailing how unsanitized user input in specific parameters can lead to arbitrary script execution in a user's browser context.
Description
Multiple cross-site scripting (XSS) vulnerabilities in admin/header.php in Toms Gaestebuch 1.01 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) lang[adminseite], (2) lang[ueberschrift], or (3) einst[metachar] parameter, different vectors than CVE-2007-4711.
Exploits (1)
The provided text describes a cross-site scripting (XSS) vulnerability in Toms Gastebuch, detailing how unsanitized user input in specific parameters can lead to arbitrary script execution in a user's browser context.