Cross-site scripting (XSS) vulnerability in admin/changedata.php in GetSimple CMS 2.01 allows remote attackers to inject arbitrary web script or HTML via the post-title parameter.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/43593 | vdb entry exploit |
http://securityreason.com/securityalert/8420 | third party advisory |
http://packetstormsecurity.org/1009-exploits/getsimplecms201-xss.txt | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/62177 | vdb entry |
http://www.securityfocus.com/archive/1/514043/100/0/threaded | mailing list |
http://www.htbridge.ch/advisory/xss_vulnerability_in_getsimple_cms_1.html | exploit |