Multiple cross-site scripting (XSS) vulnerabilities in Etano 1.22 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) user, (2) email, (3) email2, (4) f17_zip, or (5) agree parameter to join.php; (6) PATH_INFO, (7) st, (8) f17_city, (9) f17_country, (10) f17_state, (11) f17_zip, (12) f19, (13) wphoto, (14) search, or (15) v parameter to search.php; (16) PATH_INFO or (17) st parameter to photo_search.php; or (18) return parameter to photo_view.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.osvdb.org/79827 | vdb entry |
http://secunia.com/advisories/48165 | third party advisory vendor advisory |
http://www.osvdb.org/79828 | vdb entry |
http://www.osvdb.org/79829 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/73669 | vdb entry |
http://www.securityfocus.com/bid/52295 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2012-03/0013.html | mailing list |
http://www.osvdb.org/79830 | vdb entry |
http://www.openwall.com/lists/oss-security/2012/03/05/21 | mailing list |
http://www.openwall.com/lists/oss-security/2012/03/05/15 | mailing list |
http://yehg.net/lab/pr0js/advisories/%5Betano_1.2.x%5D_xss |