This exploit demonstrates an HTML injection vulnerability in phpGuestbook 1.0 and prior, where user-supplied input is not properly sanitized, allowing execution of arbitrary script code in the context of the affected website.
Classification
Working Poc 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target:phpGuestbook 1.0 and prior
No auth needed
Prerequisites:Access to the phpGuestbook comment submission form