CVE-2012-0974

Multiple cross-site scripting (XSS) vulnerabilities in the getParam function in oc-includes/osclass/core/Params.php in OSClass before 2.3.5 allow remote attackers to inject arbitrary web script or HTML via the (1) sCity, (2) sPattern, (3) sPriceMax, and (4) sPriceMin parameters in a search action to index.php.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:juan_ramon:osclass:*:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:1.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:1.1:rc:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:1.2:alpha:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:1.2:beta:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:1.2:delta:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.0:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.0:rc:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.2:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.3:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.3.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:36

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2012-01/0157.html - Exploit () http://archives.neohapsis.com/archives/bugtraq/2012-01/0157.html - Exploit
References () http://osclass.org/2012/01/16/osclass-2-3-5/ - () http://osclass.org/2012/01/16/osclass-2-3-5/ -
References () http://secunia.com/advisories/47697 - Vendor Advisory () http://secunia.com/advisories/47697 - Vendor Advisory
References () http://www.securityfocus.com/bid/51662 - Exploit () http://www.securityfocus.com/bid/51662 - Exploit
References () https://github.com/osclass/OSClass/commit/ff7ef8a97301aaaf6a97fe46c2c27981a86b4e2f#diff-73 - Exploit () https://github.com/osclass/OSClass/commit/ff7ef8a97301aaaf6a97fe46c2c27981a86b4e2f#diff-73 - Exploit
References () https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_osclass.html - Exploit () https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_osclass.html - Exploit

Information

Published : 2012-09-25 23:55

Updated : 2024-11-21 01:36


NVD link : CVE-2012-0974

Mitre link : CVE-2012-0974

CVE.ORG link : CVE-2012-0974


JSON object : View

Products Affected

juan_ramon

  • osclass
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')