Cross-site scripting (XSS) vulnerability in lib/mhtxthtml.pl in MHonArc 2.6.16 allows remote attackers to inject arbitrary web script or HTML via a malformed start tag and end tag for a SCRIPT element, as demonstrated by <scr<body>ipt> and </scr<body>ipt> sequences.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=664718 | patch exploit |
http://openwall.com/lists/oss-security/2010/12/22/4 | mailing list exploit patch |
http://openwall.com/lists/oss-security/2010/12/22/5 | mailing list patch |
http://www.vupen.com/english/advisories/2010/3344 | vdb entry vendor advisory |
http://www.vupen.com/english/advisories/2011/0067 | vdb entry |
http://www.securityfocus.com/bid/45528 | vdb entry |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607693 | |
http://secunia.com/advisories/42694 | third party advisory |
http://savannah.nongnu.org/bugs/?32013 | |
http://openwall.com/lists/oss-security/2010/12/21/7 | mailing list |
http://lists.mandriva.com/security-announce/2011-01/msg00004.php | vendor advisory |
http://www.mail-archive.com/mhonarc-dev%40mhonarc.org/msg01296.html | mailing list |
http://openwall.com/lists/oss-security/2010/12/21/4 | mailing list exploit patch |