Name : EggBlog v.3.1.0
Vendor HomePage :http://sourceforge.net/projects/eggblog/
Platforms : PHP && MySQL
Vulnerability Type : Input Validation Error
08 October 2007 – Vendor Contacted
30 October 2007 – Vendor Replied
11 November 2007 – New Release
11 November 2007 – Advisory Released
eggblog is a free PHP & MySQL blogging package. Features include an internal search engine,
photo albums, forums, plug-ins, guest comments to blog articles, automatic monthly archiving
of blog articles and RSS XML feeds for both the blog and forums.
I discovered the security holes when I was testing it for my personel web blog.
The script is vulnerable to XSS attacks.
XSS Vulnerability(home/rss.php)
<a
href=\"…/rss/blog.php\">".$_SERVER['SERVER_NAME'].str_replace("/home/rss.php","",$_SERVER['
PHP_SELF'])."/rss/blog.php</a></li>
<a
href=\"…/rss/topics.php\">".$_SERVER['SERVER_NAME'].str_replace("/home/rss.php","",$_SERVER
The attacker can succesfully launch XSS attacks with loading payload on to the URL after the
home\rss.php. For example :
http://www.example.com/home/rss.php/<script>alert(1)</script>
Download the new release : EggBlog v3.1.1
The vulnerabilities found on 08 October 2007
by Mesut Timur <[email protected]>
H - Security Labs , http://www.h-labs.org
Gebze Institue of Technology,Computer Engineering,http://www.gyte.edu.tr
http://sourceforge.net/forum/forum.php?forum_id=753622
http://www.eggblog.net
http://sourceforge.net/projects/eggblog/
Original Advisory : http://www.h-labs.org/blog/2007/11/11/eggblog_v3_1_0_xss_issues.html
Mesut TIMUR
http://www.h-labs.org
H - Security Labs Gьvenlik Editцrь
GYTE Bilgisayar Mьhendisligi