SparkleBlog is susceptible to HTML injection flaws that allow for cross site scripting attacks.
e14a0296a68e3f24127264f8acf3106e7ac65ab6441d61321f68ebed0a7a2e86
SparkleBlog is prone to HTMl injection attacks. It is possible for a malicious SparkleBlog user to inject hostile HTML script code into the commentary via form fields. This code may be rendered in the browser of a web user who views the commentary of SparkleBlog.
SparkleBlog does not adequately filter HTMl tags from various fields. This may enable an attacker to inject arbitrary script code into pages that are generated by SparkleBlog
example:
put <script>alert('test')</script> in the "name:" tag in http://localhost/journal.php?id=1
SparkleBlog home page: http://www.creamed-coconut.org/