CVE-2012-1212

Cross-site scripting (XSS) vulnerability in the smwfOnSfSetTargetName function in extensions/SMWHalo/includes/SMW_Initialize.php in Semantic Enterprise Wiki (SMW+) 1.5.6, 1.6.0_2 and earlier allows remote attackers to inject arbitrary web script or HTML via the target parameter to index.php/Special:FormEdit. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:smwplus:smw\+:*:*:*:*:*:*:*:*
cpe:2.3:a:smwplus:smw\+:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:smwplus:smw\+:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:smwplus:smw\+:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:smwplus:smw\+:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:smwplus:smw\+:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:smwplus:smw\+:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:smwplus:smw\+:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:smwplus:smw\+:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:smwplus:smw\+:1.5.6-1:*:*:*:*:*:*:*
cpe:2.3:a:smwplus:smw\+:1.6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:36

Type Values Removed Values Added
References () http://packetstormsecurity.org/files/109637/SMW-1.5.6-Cross-Site-Scripting.html - Exploit () http://packetstormsecurity.org/files/109637/SMW-1.5.6-Cross-Site-Scripting.html - Exploit
References () http://secunia.com/advisories/47968 - Vendor Advisory () http://secunia.com/advisories/47968 - Vendor Advisory
References () http://st2tea.blogspot.com/2012/02/smw-enterprise-wiki-156-cross-site.html - Exploit () http://st2tea.blogspot.com/2012/02/smw-enterprise-wiki-156-cross-site.html - Exploit
References () http://www.securityfocus.com/bid/51980 - Exploit () http://www.securityfocus.com/bid/51980 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/73167 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/73167 -

Information

Published : 2012-02-24 13:55

Updated : 2024-11-21 01:36


NVD link : CVE-2012-1212

Mitre link : CVE-2012-1212

CVE.ORG link : CVE-2012-1212


JSON object : View

Products Affected

smwplus

  • smw\+
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')