Multiple cross-site scripting (XSS) vulnerabilities in BolinOS 4.6.1 allow remote attackers to inject arbitrary web script or HTML via the (1) url parameter to (a) system/actionspages/_b/contentFiles/gBImageViewer.php, (2) ForEditor parameter to (b) system/actionspages/_b/contentFiles/gBselectorContents.php, (3) the PATH_INFO to (c) gBLoginPage.php and (d) gBPassword.php in system/actionspages/_b/contentFiles/, (4) formlogin parameter to system/actionspages/_b/contentFiles/gBLoginPage.php, and the (5) bolini_searchengine46Search parameter to (e) help/index.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/28445 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41432 | vdb entry |
https://www.exploit-db.com/exploits/5309 | exploit |
http://securityreason.com/securityalert/3788 | third party advisory |
http://www.securityfocus.com/archive/1/490058/100/0/threaded | mailing list |
http://secunia.com/advisories/29535 | third party advisory vendor advisory |