SPIP 3.1.x suffers from a Reflected Cross Site Scripting Vulnerability in /ecrire/exec/puce_statut.php involving the `$id` parameter, as demonstrated by a /ecrire/?exec=puce_statut URL.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/95008 | third party advisory vdb entry |
https://core.spip.net/projects/spip/repository/revisions/23288 | patch vendor advisory issue tracking |
http://www.securitytracker.com/id/1037486 | vdb entry |