Multiple cross-site scripting (XSS) vulnerabilities in DiamondList 0.1.6, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the (1) category[description] parameter to user/main/update_category, which is not properly handled by _app/views/categories/index.html.erb; and the (2) setting[site_title] parameter to user/main/update_settings, which is not properly handled by _app/views/settings/_list_settings.rhtml.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/512892 | exploit mailing list |
http://dev.hulihanapplications.com/issues/show/211 | |
http://secunia.com/advisories/40873 | third party advisory vendor advisory |
http://www.htbridge.ch/advisory/xss_vulnerability_in_diamondlist_1.html | |
http://www.securityfocus.com/archive/1/512897/100/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2010/2025 | vdb entry vendor advisory |
http://www.htbridge.ch/advisory/xss_vulnerability_in_diamondlist.html | |
http://dev.hulihanapplications.com/issues/show/213 | exploit |
http://packetstormsecurity.org/1008-exploits/diamondlist-xssxsrf.txt | exploit |
http://www.securityfocus.com/bid/42252 | vdb entry exploit |