Multiple cross-site scripting (XSS) vulnerabilities in dotProject before 2.1.7 allow remote attackers to inject arbitrary web script or HTML via the (1) callback parameter in a color_selector action, (2) field parameter in a date_format action, or (3) company_name parameter in an addedit action to index.php. NOTE: the date parameter vector is already covered by CVE-2008-3886.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://osvdb.org/87627 | vdb entry |
https://www.htbridge.com/advisory/HTB23124 | exploit |
http://www.securityfocus.com/bid/56624 | vdb entry exploit |
http://sourceforge.net/projects/dotproject/files/dotproject/dotProject%20Version%202.1.7/ | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/80216 | vdb entry |
http://secunia.com/advisories/51332 | third party advisory |