Multiple cross-site scripting (XSS) vulnerabilities in Dotclear before 2.4.2 allow remote attackers to inject arbitrary web script or HTML via the (1) login_data parameter to admin/auth.php; (2) nb parameter to admin/blogs.php; (3) type, (4) sortby, (5) order, or (6) status parameters to admin/comments.php; or (7) page parameter to admin/plugin.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2012-02/0183.html - | |
References | () http://dotclear.org/blog/post/2012/02/11/Dotclear-2.4.2 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/48209 - | |
References | () http://www.securityfocus.com/bid/52221 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/73565 - | |
References | () https://www.htbridge.ch/advisory/HTB23074 - Exploit |
Information
Published : 2012-03-19 19:55
Updated : 2024-11-21 01:36
NVD link : CVE-2012-1039
Mitre link : CVE-2012-1039
CVE.ORG link : CVE-2012-1039
JSON object : View
Products Affected
dotclear
- dotclear
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')