Cross-site scripting (XSS) vulnerability in admincp/apilog.php in vBulletin 4.2.2 and earlier, and 5.0.x through 5.0.5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted XMLRPC API request, as demonstrated using the client name.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/128691/vBulletin-5.x-4.x-Persistent-Cross-Site-Scripting.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2014/Oct/55 - Exploit | |
References | () http://seclists.org/fulldisclosure/2014/Oct/63 - | |
References | () http://www.securityfocus.com/bid/70577 - Exploit | |
References | () http://www.securitytracker.com/id/1031000 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/97026 - | |
References | () https://github.com/tintinweb/pub/tree/master/pocs/cve-2014-2021 - Exploit |
Information
Published : 2014-10-25 00:55
Updated : 2024-11-21 02:05
NVD link : CVE-2014-2021
Mitre link : CVE-2014-2021
CVE.ORG link : CVE-2014-2021
JSON object : View
Products Affected
vbulletin
- vbulletin
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')