Multiple cross-site scripting (XSS) vulnerabilities in Geeklog IVYWE edition 2.1.1 allow remote attackers to inject arbitrary web script or HTML by leveraging use of the COM_getCurrentURL function in (1) public_html/layout/default/header.thtml, (2) public_html/layout/bento/header.thtml, (3) public_html/layout/fotos/header.thtml, or (4) public_html/layout/default/article/article.thtml.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/92545 | third party advisory vdb entry |
https://github.com/ivywe/geeklog-ivywe/commit/41f4677e2eaa587b80eb9801150c1b402344c43d | third party advisory patch |
http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000150.html | third party advisory vdb entry |
https://www.ivywe.co.jp/article.php/xss-ivywe-distribution | vendor advisory |
http://jvn.jp/en/jp/JVN09836883/index.html | third party advisory vdb entry |
https://github.com/ivywe/geeklog-ivywe/commit/beba390fd86bd991414ebf73e3482966d7115654 | third party advisory patch |