Multiple cross-site scripting (XSS) vulnerabilities in Dotclear before 2.4.2 allow remote attackers to inject arbitrary web script or HTML via the (1) login_data parameter to admin/auth.php; (2) nb parameter to admin/blogs.php; (3) type, (4) sortby, (5) order, or (6) status parameters to admin/comments.php; or (7) page parameter to admin/plugin.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.htbridge.ch/advisory/HTB23074 | exploit |
http://dotclear.org/blog/post/2012/02/11/Dotclear-2.4.2 | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/73565 | vdb entry |
http://www.securityfocus.com/bid/52221 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2012-02/0183.html | mailing list |
http://secunia.com/advisories/48209 | third party advisory |