Multiple cross-site scripting (XSS) vulnerabilities in WikyBlog before 1.7.1 allow remote attackers to inject arbitrary web script or HTML via the (1) key parameter to index.php/Special/Main/keywordSearch, (2) revNum parameter to index.php/Edit/Main/Home, (3) to parameter to index.php/Special/Main/WhatLinksHere, (4) user parameter to index.php/Special/Main/UserEdits, and (5) the PATH_INFO to index.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://secunia.com/advisories/32087 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45603 | vdb entry |
http://sourceforge.net/project/shownotes.php?group_id=148518&release_id=647444 | |
http://osvdb.org/48790 | vdb entry |
http://www.digitrustgroup.com/advisories/web-application-security-wikyblog.html | |
http://www.securityfocus.com/bid/31525 | vdb entry exploit |