Multiple cross-site scripting (XSS) vulnerabilities in TWiki 6.0.1 allow remote attackers to inject arbitrary web script or HTML via the (1) QUERYSTRING variable in lib/TWiki.pm or (2) QUERYPARAMSTRING variable in lib/TWiki/UI/View.pm, as demonstrated by the QUERY_STRING to do/view/Main/TWikiPreferences.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2014/Dec/81 | mailing list exploit |
http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2014-9325 | vendor advisory |
http://www.securitytracker.com/id/1031399 | vdb entry exploit |
http://packetstormsecurity.com/files/129654/TWiki-6.0.1-QUERYSTRING-QUERYPARAMSTRING-XSS.html | exploit |