Multiple cross-site scripting (XSS) vulnerabilities in GetSimple CMS 3.3.1 allow remote attackers to inject arbitrary web script or HTML via the (1) param parameter to admin/load.php or (2) user, (3) email, or (4) name parameter in a Save Settings action to admin/settings.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2014/May/53 | mailing list |
https://raw.githubusercontent.com/pedrib/PoC/master/getsimplecms-3.3.1.txt | exploit |
http://www.securityfocus.com/bid/67337 | vdb entry exploit |