Multiple cross-site scripting (XSS) vulnerabilities in Habari 0.6.5, when register_globals is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) additem_form parameter to system/admin/dash_additem.php and the (2) status_data[] parameter to system/admin/dash_status.php. NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 01:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/42688 - Vendor Advisory | |
References | () http://wiki.habariproject.org/en/Release_0.6.6 - | |
References | () http://www.exploit-db.com/exploits/15799 - Exploit | |
References | () http://www.htbridge.ch/advisory/xss_vulnerability_in_habari.html - Exploit | |
References | () http://www.htbridge.ch/advisory/xss_vulnerability_in_habari_1.html - Exploit |
Information
Published : 2010-12-29 22:33
Updated : 2025-04-11 00:51
NVD link : CVE-2010-4607
Mitre link : CVE-2010-4607
CVE.ORG link : CVE-2010-4607
JSON object : View
Products Affected
habariproject
- habari
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')