Description
Webgrind 1.1 and before contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts via the file parameter in index.php. The application does not sufficiently encode user-controlled inputs, allowing attackers to execute arbitrary JavaScript in victim's browsers by crafting malicious URLs.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
Rafael Pedrero
References
www.exploit-db.com/exploits/51074
www.exploit-db.com/exploits/51074 (ExploitDB-51074)
github.com/jokkedk/webgrind/ (Webgrind GitHub Repository)
www.vulncheck.com/...s-site-scripting-xss-via-file-parameter (VulnCheck Advisory: Webgrind 1.1 - Reflected Cross-Site Scripting (XSS) via file Parameter)