Cross-site scripting (XSS) vulnerability in admin/menu.php in SAXON 5.4 allows remote attackers to inject arbitrary web script or HTML via the config[news_url] parameter.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/38134 | vdb entry |
http://www.securityfocus.com/bid/26237 | exploit vdb entry patch |
http://www.quirm.net/punbb/viewtopic.php?id=129 | |
http://securityreason.com/securityalert/3310 | third party advisory |
http://www.securityfocus.com/archive/1/482920/100/0/threaded | mailing list |
http://www.netvigilance.com/advisory0054 | |
http://secunia.com/advisories/27444 | third party advisory vendor advisory |