CVE-2008-6945

Multiple cross-site scripting (XSS) vulnerabilities in Interchange 5.7 before 5.7.1, 5.6 before 5.6.1, and 5.4 before 5.4.3 allow remote attackers to inject arbitrary web script or HTML via (1) the mv_order_item CGI variable parameter in Core, (2) the country-select widget, or (3) possibly the value specifier when used in the UserTag feature.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:icdevgroup:interchange:5.4.0:*:*:*:*:*:*:*
cpe:2.3:a:icdevgroup:interchange:5.4.1:*:*:*:*:*:*:*
cpe:2.3:a:icdevgroup:interchange:5.4.2:*:*:*:*:*:*:*
cpe:2.3:a:icdevgroup:interchange:5.6.0:*:*:*:*:*:*:*
cpe:2.3:a:icdevgroup:interchange:5.7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:57

Type Values Removed Values Added
References () http://ftp.icdevgroup.org/interchange/5.7/WHATSNEW - Vendor Advisory () http://ftp.icdevgroup.org/interchange/5.7/WHATSNEW - Vendor Advisory
References () http://osvdb.org/49852 - () http://osvdb.org/49852 -
References () http://osvdb.org/49853 - () http://osvdb.org/49853 -
References () http://secunia.com/advisories/32658 - Vendor Advisory () http://secunia.com/advisories/32658 - Vendor Advisory
References () http://www.icdevgroup.org/i/dev/news?id=ssEkj9j8&mv_arg=00030&mv_pc=96 - Patch, Vendor Advisory () http://www.icdevgroup.org/i/dev/news?id=ssEkj9j8&mv_arg=00030&mv_pc=96 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/32297 - () http://www.securityfocus.com/bid/32297 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/46598 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/46598 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/46599 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/46599 -

Information

Published : 2009-08-12 10:30

Updated : 2024-11-21 00:57


NVD link : CVE-2008-6945

Mitre link : CVE-2008-6945

CVE.ORG link : CVE-2008-6945


JSON object : View

Products Affected

icdevgroup

  • interchange
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')