Cross-site scripting (XSS) vulnerability in admin/comments.php in Dotclear before 2.8.2 allows remote attackers to inject arbitrary web script or HTML via the author name in a comment.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/134353/dotclear-2.8.1-Cross-Site-Scripting.html | exploit vdb entry third party advisory |
http://www.openwall.com/lists/oss-security/2016/03/07/5 | mailing list third party advisory patch |
https://blog.curesec.com/article/blog/dotclear-281-XSS-94.html | exploit third party advisory patch |
http://www.openwall.com/lists/oss-security/2016/03/05/4 | mailing list third party advisory patch |
http://dotclear.org/blog/post/2015/10/25/Dotclear-2.8.2 | release notes vendor advisory |
http://www.securityfocus.com/bid/96377 | vdb entry |
https://hg.dotclear.org/dotclear/rev/65e65154dadf | issue tracking patch vendor advisory |
http://seclists.org/fulldisclosure/2015/Nov/59 | mailing list third party advisory patch |