[原文]Multiple cross-site scripting (XSS) vulnerabilities in Carbonize Lazarus Guestbook 1.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the show parameter in codes-english.php and (2) the img parameter in picture.php, after the name of an existing file.
Lazarus Guestbook codes-english.php show Parameter XSS
Remote / Network Access
Loss of Integrity
Lazarus Guestbook contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'show' variable upon submission to the codes-english.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Upgrade to version version 1.5.5 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.
Note that vulnerability has also been fixed in version 1.6 beta 8.