MTP Guestbook 1.0 Multiple Remote Script Insertion Vulnerabilities

Title: MTP Guestbook 1.0 Multiple Remote Script Insertion Vulnerabilities
Advisory ID: ZSL-2013-5131
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 25.02.2013
Summary
MTP Guestbook allows you to put a guestbook on your website. Your visitors can sign it and leave a message. The entries can be edited and deleted in the admin area.
Description
MTP Guestbook script suffers from multiple stored cross-site scripting vulnerabilities. The issues are triggered when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Vendor
MTP Scripts - http://www.morephp.net
Affected Version
1.0
Tested On
Linux, Apache2
Vendor Status
[17.02.2013] Vulnerability discovered.
[19.02.2013] Contact with the vendor.
[24.02.2013] No response from the vendor.
[25.02.2013] Public security advisory released.
PoC
mtpguestbook_xss.html
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
[1] http://packetstormsecurity.com/files/120532
[2] http://www.securityfocus.com/bid/58149
[3] http://cxsecurity.com/issue/WLB-2013020192
[4] http://www.exploit-db.com/exploits/24545/
[5] http://xforce.iss.net/xforce/xfdb/82383
[6] http://www.osvdb.org/show/osvdb/90638
[7] http://www.osvdb.org/show/osvdb/90639
[8] http://www.osvdb.org/show/osvdb/90642
Changelog
[25.02.2013] - Initial release
[26.02.2013] - Added reference [1], [2], [3] and [4]
[27.02.2013] - Added reference [5]
[28.02.2013] - Added reference [6], [7] and [8]
Contact
Zero Science Lab

Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk