Multiple cross-site scripting (XSS) vulnerabilities in oBlog allow remote attackers to inject arbitrary web script or HTML via the (1) commentName, (2) commentEmail, (3) commentWeb, or (4) commentText parameter to article.php; and allow remote authenticated administrators to inject arbitrary web script or HTML via the (5) article_id or (6) title parameter to admin/write.php, the (7) category_id or (8) category_name parameter to admin/groups.php, the (9) blogroll_id or (10) title parameter to admin/blogroll.php, or the (11) blog_name or (12) tag_line parameter to admin/settings.php.
References
Configurations
History
21 Nov 2024, 01:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/60906 - | |
References | () http://packetstormsecurity.org/0912-exploits/oblog-xssxsrf.txt - Exploit | |
References | () http://secunia.com/advisories/37661 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/54713 - |
Information
Published : 2010-06-25 19:30
Updated : 2024-11-21 01:10
NVD link : CVE-2009-4908
Mitre link : CVE-2009-4908
CVE.ORG link : CVE-2009-4908
JSON object : View
Products Affected
dootzky
- oblog
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')