Multiple cross-site scripting (XSS) vulnerabilities in eXpBlog 0.3.5 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the query string (PHP_SELF) in kalender.php or (2) the captcha_session_code parameter in pre_details.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://securitytracker.com/id?1017028 | vdb entry |
http://secunia.com/advisories/22328 | third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/448102/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29409 | vdb entry |
http://www.expblog.de/board/viewtopic.php?t=317 | patch |
http://www.vupen.com/english/advisories/2006/3973 | vdb entry vendor advisory |
http://marc.info/?l=full-disclosure&m=116042862409660&w=2 | mailing list |
http://www.securityfocus.com/bid/20420 | vdb entry exploit |