Stored XSS vulnerability via a comment in inc/conv.php in BlogoText before 3.7.6 allows an unauthenticated attacker to inject JavaScript. If the victim is an administrator, an attacker can (for example) change global settings or create/delete posts. It is also possible to execute JavaScript against unauthenticated users of the blog.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/BlogoText/blogotext/issues/318 | issue tracking third party advisory patch |
https://github.com/BlogoText/blogotext/pull/320/commits/1a283cc8ad2cda37e0a6aff8f4558b98ecbfd9c2 | issue tracking third party advisory patch |
https://github.com/BlogoText/blogotext/releases/tag/3.7.6 | release notes third party advisory patch |
http://openwall.com/lists/oss-security/2017/10/01/1 | mailing list third party advisory patch |