Multiple cross-site scripting (XSS) vulnerabilities in OpenDocMan 1.2.5 allow remote attackers to inject arbitrary web script or HTML via the last_message parameter to (1) add.php, (2) toBePublished.php, (3) index.php, and (4) admin.php; the PATH_INFO to the default URI to (5) category.php, (6) department.php, (7) profile.php, (8) rejects.php, (9) search.php, (10) toBePublished.php, (11) user.php, and (12) view_file.php; and (13) the caller parameter in a Modify User action to user.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://osvdb.org/59302 | vdb entry |
http://osvdb.org/59307 | vdb entry |
http://www.securityfocus.com/bid/36777 | exploit vdb entry patch |
http://osvdb.org/59309 | vdb entry |
http://osvdb.org/59304 | vdb entry |
http://osvdb.org/59311 | vdb entry |
http://osvdb.org/59310 | vdb entry |
http://osvdb.org/59308 | vdb entry |
http://secunia.com/advisories/30750 | third party advisory vendor advisory |
http://www.packetstormsecurity.org/0910-exploits/opendocman-sqlxss.txt | exploit |
http://osvdb.org/59303 | vdb entry |
http://osvdb.org/59305 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/53887 | vdb entry |
http://osvdb.org/59306 | vdb entry |
http://osvdb.org/59312 | vdb entry |