Multiple cross-site scripting (XSS) vulnerabilities in ATutor before 2.1 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) themes/default/tile_search/index.tmpl.php, (2) login.php, (3) search.php, (4) password_reminder.php, (5) login.php/jscripts/infusion, (6) login.php/mods/_standard/flowplayer, (7) browse.php/jscripts/infusion/framework/fss, (8) registration.php/themes/default/ie_styles.css, (9) about.php, or (10) themes/default/social/basic_profile.tmpl.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/51423 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/72412 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2012-01/0094.html | mailing list exploit |
http://atutor.ca/atutor/change_log.php | |
http://www.darksecurity.de/advisories/2012/SSCHADV2012-002.txt | exploit |
http://secunia.com/advisories/47597 | third party advisory vendor advisory |