CVE-2009-4168

Cross-site scripting (XSS) vulnerability in Roy Tanck tagcloud.swf, as used in the WP-Cumulus plugin before 1.23 for WordPress and the Joomulus module 2.0 and earlier for Joomla!, allows remote attackers to inject arbitrary web script or HTML via the tagcloud parameter in a tags action. Cross-site scripting (XSS) vulnerability in tagcloud.swf in the WP-Cumulus Plug-in before 1.23 for WordPress allows remote attackers to inject arbitrary web script or HTML via the tagcloud parameter.
References
Link Resource
http://packetstormsecurity.org/1001-exploits/joomlajvclouds-xss.txt
http://secunia.com/advisories/37483 Vendor Advisory
http://secunia.com/advisories/38161
http://websecurity.com.ua/3665/ Exploit
http://websecurity.com.ua/3789/
http://websecurity.com.ua/3801/
http://websecurity.com.ua/3839/
http://www.roytanck.com/2009/11/15/wp-cumulus-updated-to-address-yet-another-security-issue/ Vendor Advisory
http://www.securityfocus.com/archive/1/508071/100/0/threaded
http://www.securityfocus.com/archive/1/508606/100/0/threaded
http://www.securityfocus.com/archive/1/508833/100/0/threaded
http://www.securityfocus.com/bid/37100 Exploit
http://www.securityfocus.com/bid/37479
http://www.vupen.com/english/advisories/2009/3322 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54397
https://exchange.xforce.ibmcloud.com/vulnerabilities/55156
http://packetstormsecurity.org/1001-exploits/joomlajvclouds-xss.txt
http://secunia.com/advisories/37483 Vendor Advisory
http://secunia.com/advisories/38161
http://websecurity.com.ua/3665/ Exploit
http://websecurity.com.ua/3789/
http://websecurity.com.ua/3801/
http://websecurity.com.ua/3839/
http://www.roytanck.com/2009/11/15/wp-cumulus-updated-to-address-yet-another-security-issue/ Vendor Advisory
http://www.securityfocus.com/archive/1/508071/100/0/threaded
http://www.securityfocus.com/archive/1/508606/100/0/threaded
http://www.securityfocus.com/archive/1/508833/100/0/threaded
http://www.securityfocus.com/bid/37100 Exploit
http://www.securityfocus.com/bid/37479
http://www.vupen.com/english/advisories/2009/3322 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54397
https://exchange.xforce.ibmcloud.com/vulnerabilities/55156
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:roytanck:wp-cumulus:*:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.00:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.01:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.02:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.03:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.04:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.05:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.10:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.11:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.12:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.13:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.14:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.15:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.16:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.17:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.18:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.19:*:*:*:*:*:*:*
cpe:2.3:a:roytanck:wp-cumulus:1.20:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:09

Type Values Removed Values Added
References () http://packetstormsecurity.org/1001-exploits/joomlajvclouds-xss.txt - () http://packetstormsecurity.org/1001-exploits/joomlajvclouds-xss.txt -
References () http://secunia.com/advisories/37483 - Vendor Advisory () http://secunia.com/advisories/37483 - Vendor Advisory
References () http://secunia.com/advisories/38161 - () http://secunia.com/advisories/38161 -
References () http://websecurity.com.ua/3665/ - Exploit () http://websecurity.com.ua/3665/ - Exploit
References () http://websecurity.com.ua/3789/ - () http://websecurity.com.ua/3789/ -
References () http://websecurity.com.ua/3801/ - () http://websecurity.com.ua/3801/ -
References () http://websecurity.com.ua/3839/ - () http://websecurity.com.ua/3839/ -
References () http://www.roytanck.com/2009/11/15/wp-cumulus-updated-to-address-yet-another-security-issue/ - Vendor Advisory () http://www.roytanck.com/2009/11/15/wp-cumulus-updated-to-address-yet-another-security-issue/ - Vendor Advisory
References () http://www.securityfocus.com/archive/1/508071/100/0/threaded - () http://www.securityfocus.com/archive/1/508071/100/0/threaded -
References () http://www.securityfocus.com/archive/1/508606/100/0/threaded - () http://www.securityfocus.com/archive/1/508606/100/0/threaded -
References () http://www.securityfocus.com/archive/1/508833/100/0/threaded - () http://www.securityfocus.com/archive/1/508833/100/0/threaded -
References () http://www.securityfocus.com/bid/37100 - Exploit () http://www.securityfocus.com/bid/37100 - Exploit
References () http://www.securityfocus.com/bid/37479 - () http://www.securityfocus.com/bid/37479 -
References () http://www.vupen.com/english/advisories/2009/3322 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/3322 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/54397 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/54397 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/55156 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/55156 -

Information

Published : 2009-12-02 18:30

Updated : 2024-11-21 01:09


NVD link : CVE-2009-4168

Mitre link : CVE-2009-4168

CVE.ORG link : CVE-2009-4168


JSON object : View

Products Affected

wordpress

  • wordpress

roytanck

  • wp-cumulus
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')