Headline
CVE-2009-10001: FIXED issue #2: Solves XSS en example-form.php · jianlinwei/cool-php-captcha@c84fb6b
A vulnerability classified as problematic was found in jianlinwei cool-php-captcha up to 0.2. This vulnerability affects unknown code of the file example-form.php. The manipulation of the argument captcha with the input %3Cscript%3Ealert(1)%3C/script%3E leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.3 is able to address this issue. The name of the patch is c84fb6b153bebaf228feee0cbf50728d27ae3f80. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218296.
Skip to content
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
* Explore
* All features
* Documentation
* GitHub Skills
* Blog
For
Enterprise
Teams
Startups
Education
By Solution
CI/CD & Automation
DevOps
DevSecOps
Case Studies
Customer Stories
Resources
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
* Repositories
* Topics
* Trending
* Collections
Pricing
Notifications
Fork 0
Code
Issues 15
Pull requests
Actions
Projects
Security
Insights
Permalink
Browse files
FIXED issue #2: Solves XSS en example-form.php
- Loading branch information
joserodriguezvalderrama committed
Feb 23, 2009
1 parent c4e8508 commit c84fb6b153bebaf228feee0cbf50728d27ae3f80
Showing 1 changed file with 3 additions and 1 deletion.
@@ -40,6 +40,8 @@
$style = "background-color: #CCFF99";
}
$request_captcha = htmlspecialchars($_REQUEST[‘captcha’]);
echo <<<HTML
<div id="result" style="$style">
<h2>$captcha_message</h2>
@@ -50,7 +52,7 @@
</tr>
<tr>
<td>Form CAPTCHA:</td>
<td>{$_REQUEST[‘captcha’]}</td>
<td>$request_captcha</td>
</tr>
</table>
</div>
0 comments on commit c84fb6b
Please sign in to comment.