Multiple cross-site scripting (XSS) vulnerabilities in GoAhead Webserver 2.18 allow remote attackers to inject arbitrary web script or HTML via (1) the group parameter to goform/AddGroup, related to addgroup.asp; (2) the url parameter to goform/AddAccessLimit, related to addlimit.asp; or the (3) user (aka User ID) or (4) group parameter to goform/AddUser, related to adduser.asp.
References
Link | Resource |
---|---|
http://secunia.com/advisories/46894 | |
http://www.kb.cert.org/vuls/id/384427 | Exploit US Government Resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/70434 | |
http://secunia.com/advisories/46894 | |
http://www.kb.cert.org/vuls/id/384427 | Exploit US Government Resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/70434 |
Configurations
History
21 Nov 2024, 01:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/46894 - | |
References | () http://www.kb.cert.org/vuls/id/384427 - Exploit, US Government Resource | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/70434 - |
Information
Published : 2011-11-03 10:55
Updated : 2024-11-21 01:32
NVD link : CVE-2011-4273
Mitre link : CVE-2011-4273
CVE.ORG link : CVE-2011-4273
JSON object : View
Products Affected
goahead
- goahead_webserver
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')