Multiple cross-site scripting (XSS) vulnerabilities in templates/example_template.php in AwesomeTemplateEngine allow remote attackers to inject arbitrary web script or HTML via the (1) data[title], (2) data[message], (3) data[table][1][item], (4) data[table][1][url], or (5) data[poweredby] parameter.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html | mailing list exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/39396 | vdb entry |
http://securityvulns.ru/Sdocument784.html | exploit |
http://www.securityfocus.com/archive/1/485786/100/0/threaded | mailing list |
http://securityreason.com/securityalert/3539 | third party advisory |
http://websecurity.com.ua/1694/ | exploit |
http://www.securityfocus.com/bid/27125 | vdb entry exploit |