Cross-site scripting (XSS) vulnerability in the comment posting feature in LightNEasy 2.2.1 "no database" (aka flat) and 2.2.2 SQLite allows remote attackers to inject arbitrary web script or HTML via the (1) commentname (aka Author), (2) commentemail (aka Email), and (3) commentmessage (aka Comment) parameters. NOTE: some of these details are obtained from third party information.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://forum.intern0t.net/intern0t-advisories/1081-intern0t-lightneasy-2-2-2-html-injection-vulnerability.html - | |
References | () http://secunia.com/advisories/35354 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/504092/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/35229 - |
Information
Published : 2009-06-05 18:30
Updated : 2024-11-21 01:03
NVD link : CVE-2009-1937
Mitre link : CVE-2009-1937
CVE.ORG link : CVE-2009-1937
JSON object : View
Products Affected
lightneasy
- lightneasy
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')