Multiple cross-site scripting (XSS) vulnerabilities in PHPlist 2.10.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) listname parameter in (a) admin/editlist.php, (2) title parameter in (b) admin/spageedit.php, (3) title field in (c) admin/template.php, (4) filter, (5) delete, and (6) start parameters in (d) admin/eventlog.php, (7) id parameter in (e) admin/configure.php, (8) find parameter in (f) admin/users.php, (9) start parameter in (g) admin/admin.php, and (10) action parameter in (h) admin/fckphplist.php.
Link | Tags |
---|---|
http://www.trapkit.de/advisories/TKADV2005-11-001.txt | exploit patch vendor advisory |
http://osvdb.org/20574 | vdb entry |
http://www.securityfocus.com/archive/1/416005/30/0/threaded | mailing list |
http://osvdb.org/20573 | vdb entry |
http://www.vupen.com/english/advisories/2005/2345 | vdb entry |
http://secunia.com/advisories/17476 | third party advisory patch vendor advisory |
http://www.securityfocus.com/bid/15350 | vdb entry |
http://osvdb.org/20572 | vdb entry |
http://osvdb.org/20570 | vdb entry |
http://osvdb.org/20571 | vdb entry |
http://osvdb.org/20576 | vdb entry |
http://osvdb.org/20575 | vdb entry |