WBCE v1.1.11 is vulnerable to reflected XSS via the "begriff" POST parameter in /admin/admintools/tool.php?tool=user_search
References
Link | Resource |
---|---|
https://github.com/WBCE/WBCE_CMS/commit/0da620016aec17ac2d2f3a22c55ab8c2b55e691e#diff-7b380285e285160d0070863099baabe0 | Patch Third Party Advisory |
https://github.com/WBCE/WBCE_CMS/commit/0da620016aec17ac2d2f3a22c55ab8c2b55e691e#diff-7b380285e285160d0070863099baabe0 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/WBCE/WBCE_CMS/commit/0da620016aec17ac2d2f3a22c55ab8c2b55e691e#diff-7b380285e285160d0070863099baabe0 - Patch, Third Party Advisory |
Information
Published : 2017-11-17 01:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000213
Mitre link : CVE-2017-1000213
CVE.ORG link : CVE-2017-1000213
JSON object : View
Products Affected
wbce
- wbce_cms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')