Revive Adserver before 3.2.3 suffers from Persistent XSS. A vector for persistent XSS attacks via the Revive Adserver user interface exists, requiring a trusted (non-admin) account. The website name wasn't properly escaped when displayed in the campaign-zone.php script.
References
Link | Resource |
---|---|
https://github.com/revive-adserver/revive-adserver/commit/f6880330a8e11e804663f132867e9eb9b1f94e83 | Issue Tracking Patch Third Party Advisory |
https://www.revive-adserver.com/security/revive-sa-2016-001/ | Patch Vendor Advisory |
https://github.com/revive-adserver/revive-adserver/commit/f6880330a8e11e804663f132867e9eb9b1f94e83 | Issue Tracking Patch Third Party Advisory |
https://www.revive-adserver.com/security/revive-sa-2016-001/ | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 03:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/revive-adserver/revive-adserver/commit/f6880330a8e11e804663f132867e9eb9b1f94e83 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://www.revive-adserver.com/security/revive-sa-2016-001/ - Patch, Vendor Advisory |
Information
Published : 2017-03-28 02:59
Updated : 2024-11-21 03:00
NVD link : CVE-2016-9130
Mitre link : CVE-2016-9130
CVE.ORG link : CVE-2016-9130
JSON object : View
Products Affected
revive-adserver
- revive_adserver
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')