Multiple cross-site scripting (XSS) vulnerabilities in BarracudaDrive before 6.7 allow remote attackers to inject arbitrary web script or HTML via the (1) sForumName or (2) sDescription parameter to Forum/manage/ForumManager.lsp; (3) sHint, (4) sWord, or (5) nId parameter to Forum/manage/hangman.lsp; (6) user parameter to rtl/protected/admin/wizard/setuser.lsp; (7) name or (8) email parameter to feedback.lsp; (9) lname or (10) url parameter to private/manage/PageManager.lsp; (11) cmd parameter to fs; (12) newname, (13) description, (14) firstname, (15) lastname, or (16) id parameter to rtl/protected/mail/manage/list.lsp; or (17) PATH_INFO to fs/.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://secunia.com/advisories/57451 | third party advisory not applicable |
http://secpod.org/blog/?p=2158 | broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/91920 | vdb entry vendor advisory |
http://packetstormsecurity.com/files/125766 | third party advisory vdb entry exploit |
http://secpod.org/advisories/SecPod_BarracudaDrive_Mult_XSS_Vuln.txt | broken link |
http://barracudadrive.com/readme.txt | release notes vendor advisory |
http://www.securityfocus.com/bid/66269 | third party advisory vdb entry |