Cross-site scripting (XSS) vulnerability in Geeklog 1.4.0sr4 and earlier, and 1.3.11sr6 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors when validating comments in (1) lib-comment.php (1.4.0sr4) or (2) comment.php (0.3.11sr6).
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2006/2865 | third party advisory vdb entry permissions required |
http://www.geeklog.net/article.php/geeklog-1.4.0sr5 | patch vendor advisory |
http://secunia.com/advisories/21094 | third party advisory |
http://jvn.jp/jp/JVN%2381108784/index.html | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27813 | third party advisory vdb entry |