Multiple cross-site scripting (XSS) vulnerabilities in BarracudaDrive before 6.7.2 allow remote attackers to inject arbitrary web script or HTML via the (1) role parameter to roles.lsp, (2) name parameter to user.lsp, (3) path parameter to wizard/setuser.lsp, (4) host parameter to tunnelconstr.lsp, or (5) newpath parameter to wfsconstr.lsp in rtl/protected/admin/.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://secpod.org/advisories/SecPod_Advistory_BarracudaDrive_6.7.1_Mult_XSS_Vuln.txt - Exploit | |
References | () http://secpod.org/blog/?p=2309 - | |
References | () http://secunia.com/advisories/58309 - | |
References | () http://www.securityfocus.com/bid/67138 - |
Information
Published : 2014-05-21 14:55
Updated : 2024-11-21 02:08
NVD link : CVE-2014-3808
Mitre link : CVE-2014-3808
CVE.ORG link : CVE-2014-3808
JSON object : View
Products Affected
barracudadrive
- barracudadrive
realtimelogic
- barracudadrive
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')