Multiple cross-site scripting (XSS) vulnerabilities in Scout Portal Toolkit (SPT) 1.3.1 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the ss parameter in SPT--QuickSearch.php; (2) ParentId parameter in SPT--BrowseResources.php; (3) the ResourceId parameter in SPT--FullRecord.php; (4) ResourceOffset parameter in SPT--Home.php, (5) F_SearchString parameter in SPT--QuickSearch.php; (6) F_UserName and (7) F_Password parameters in SPT--UserLogin.php; (8) F_SearchCat1, (9) F_TextField1, (10) F_SearchCat2, (11) F_TextField2, (12) F_SearchCat3, (13) F_TextField3, (14) F_SearchCat4, (15) F_TextField4, (16) ResourceType, (17) Language, (18) Audience, (19) Format parameters in SPT--AdvancedSearch.php.
Link | Tags |
---|---|
http://www.osvdb.org/21635 | vdb entry |
http://www.vupen.com/english/advisories/2005/2844 | vdb entry |
http://www.securityfocus.com/bid/15818 | vdb entry exploit |
http://www.osvdb.org/21633 | vdb entry |
http://secunia.com/advisories/17979 | third party advisory vendor advisory |
http://www.osvdb.org/21634 | vdb entry |
http://www.x-illusion.com/rs/Scout%20Portal%20Toolkit.txt | exploit |
http://www.osvdb.org/21632 | vdb entry |
http://www.osvdb.org/21636 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/23545 | vdb entry |
http://www.osvdb.org/21631 | vdb entry |
http://www.osvdb.org/21630 | vdb entry |