Multiple cross-site scripting (XSS) vulnerabilities in the admin area in couponPHP before 1.2.0 allow remote administrators to inject arbitrary web script or HTML via the (1) sEcho parameter to comments_paginate.php or (2) stores_paginate.php or the (3) affiliate_url, (4) description, (5) domain, (6) seo[description], (7) seo[heading], (8) seo[title], (9) seo[keywords], (10) setting[logo], (11) setting[perpage], or (12) setting[sitename] to admin/index.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://couponphp.com/changelog | |
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5170.php | exploit |
http://secunia.com/advisories/57177 | third party advisory |
http://osvdb.org/show/osvdb/103886 | vdb entry |
http://osvdb.org/show/osvdb/103897 | vdb entry |
http://osvdb.org/show/osvdb/103887 | vdb entry |
http://www.exploit-db.com/exploits/32037 | exploit |
http://packetstormsecurity.com/files/125480 | exploit |