An issue was discovered in BTITeam XBTIT 2.5.4. news.php allows XSS via the id parameter.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/btiteam/xbtit/pull/58 | third party advisory patch |
https://rastating.github.io/xbtit-multiple-vulnerabilities/ | exploit third party advisory patch |