Multiple cross-site scripting (XSS) vulnerabilities in index.php in Shaarli allow remote attackers to inject arbitrary web script or HTML via the URL to the (1) showRSS, (2) showATOM, or (3) showDailyRSS function; a (4) file name to the importFile function; or (5) vectors related to bookmarks.
References
Link | Resource |
---|---|
http://seclists.org/oss-sec/2014/q2/1 | Exploit Mailing List Patch Third Party Advisory |
http://seclists.org/oss-sec/2014/q2/4 | Exploit Mailing List Patch Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/92215 | Third Party Advisory VDB Entry |
https://github.com/sebsauvage/Shaarli/commit/53da201749f8f362323ef278bf338f1d9f7a925a | Patch Third Party Advisory |
https://github.com/sebsauvage/Shaarli/issues/134 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-01-02 20:15
Updated : 2024-02-04 20:39
NVD link : CVE-2013-7351
Mitre link : CVE-2013-7351
CVE.ORG link : CVE-2013-7351
JSON object : View
Products Affected
shaarli_project
- shaarli
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')