Cross-site scripting (XSS) vulnerability in app/views/layouts/base.rhtml in Redmine 1.0.1 through 1.1.1 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to projects/hg-helloworld/news/. NOTE: some of these details are obtained from third party information.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/47193 | vdb entry exploit |
http://secunia.com/advisories/43999 | third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/517355/100/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2011/0895 | vdb entry vendor advisory |
http://securityreason.com/securityalert/8211 | third party advisory |
http://osvdb.org/71564 | vdb entry |
http://www.redmine.org/news/53 | patch vendor advisory |
http://www.mavitunasecurity.com/XSS-vulnerability-in-Redmine/ | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/66612 | vdb entry |