Multiple cross-site scripting (XSS) vulnerabilities in OpenBiblio 0.5.2-pre4 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) LAST and (2) FIRST parameters to admin/staff_del_confirm.php, (3) the name parameter to admin/theme_del_confirm.php, or (4) the themeName parameter to admin/theme_preview.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://securityreason.com/securityalert/3502 | third party advisory |
http://www.securityfocus.com/archive/1/485588/100/0/threaded | mailing list |
http://osvdb.org/39869 | vdb entry |
http://sourceforge.net/project/shownotes.php?release_id=451780&group_id=50071 | |
http://www.securityfocus.com/bid/27053 | patch vdb entry exploit |
http://sourceforge.net/project/shownotes.php?release_id=488061&group_id=50071 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/39297 | vdb entry |
http://osvdb.org/39870 | vdb entry |
http://osvdb.org/39871 | vdb entry |