Multiple cross-site scripting (XSS) vulnerabilities in the "stand alone PHP application for the OSM Player," as used in the MediaFront module 6.x-1.x before 6.x-1.5 and 7.x-1.x before 7.x-1.5 for Drupal, allow remote attackers to inject arbitrary web script or HTML via (1) $_SERVER['HTTP_HOST'] or (2) $_SERVER['SCRIPT_NAME'] to players/osmplayer/player/OSMPlayer.php, (3) playlist parameter to players/osmplayer/player/getplaylist.php, and possibly other vectors related to $_SESSION.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://drupal.org/node/1461424 | patch vendor advisory |
http://drupalcode.org/project/mediafront.git/commitdiff/b3857aa | patch exploit |
http://drupalcode.org/project/mediafront.git/commitdiff/6300750 | patch exploit |
https://drupal.org/node/1460892 | patch |
http://www.openwall.com/lists/oss-security/2012/04/07/1 | mailing list |
http://www.securityfocus.com/bid/52229 | vdb entry |
https://drupal.org/node/1460894 | patch |
http://www.osvdb.org/79684 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/73606 | vdb entry |