Multiple cross-site scripting (XSS) vulnerabilities in TemaTres 1.0.3 and 1.031 allow remote attackers to inject arbitrary web script or HTML via the (1) search form; (2) _expresion_de_busqueda, (3) letra, (4) estado_id, and (5) tema parameters to index.php; the (6) PATH_INFO to index.php; (7) unspecified parameters when editing a term as specified by the edit_id and tema parameters to index.php; and the (7) y, (8) ord, and (9) m parameters to sobre.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/8615 | exploit |
http://osvdb.org/54247 | vdb entry |
http://www.securityfocus.com/bid/34830 | vdb entry exploit |
http://secunia.com/advisories/34990 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/50343 | vdb entry |
http://www.securityfocus.com/archive/1/503252/100/0/threaded | mailing list |
http://secunia.com/advisories/34983 | third party advisory vendor advisory |