Multiple cross-site scripting (XSS) vulnerabilities in Textpattern (aka Txp CMS) 4.0.5 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to setup/index.php or (2) the name parameter to index.php in the comments preview section.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://secunia.com/advisories/28793 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/27606 | exploit vdb entry patch |
http://www.securityfocus.com/archive/1/487483/100/200/threaded | mailing list |
http://securityreason.com/securityalert/4786 | third party advisory |
http://textpattern.com/weblog/310/textpattern-406-released | patch |