An issue was discovered in BTITeam XBTIT 2.5.4. The "act" parameter in the sign-up page available at /index.php?page=signup is vulnerable to reflected cross-site scripting.
References
Link | Resource |
---|---|
https://github.com/btiteam/xbtit/pull/58 | Third Party Advisory |
https://rastating.github.io/xbtit-multiple-vulnerabilities/ | Exploit Patch Third Party Advisory |
https://github.com/btiteam/xbtit/pull/58 | Third Party Advisory |
https://rastating.github.io/xbtit-multiple-vulnerabilities/ | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/btiteam/xbtit/pull/58 - Third Party Advisory | |
References | () https://rastating.github.io/xbtit-multiple-vulnerabilities/ - Exploit, Patch, Third Party Advisory |
Information
Published : 2018-09-05 21:29
Updated : 2024-11-21 03:51
NVD link : CVE-2018-15678
Mitre link : CVE-2018-15678
CVE.ORG link : CVE-2018-15678
JSON object : View
Products Affected
btiteam
- xbtit
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')