Multiple cross-site scripting (XSS) vulnerabilities in WeBid 1.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) TPL_name, (2) TPL_nick, (3) TPL_email, (4) TPL_year, (5) TPL_address, (6) TPL_city, (7) TPL_prov, (8) TPL_zip, (9) TPL_phone, (10) TPL_pp_email, (11) TPL_authnet_id, (12) TPL_authnet_pass, (13) TPL_worldpay_id, (14) TPL_toocheckout_id, or (15) TPL_moneybookers_email in a first action to register.php or the (16) username parameter in a login action to user_login.php.
References
Configurations
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/127431/WeBid-1.1.1-Cross-Site-Scripting-LDAP-Injection.html - Exploit | |
References | () http://www.securityfocus.com/bid/68519 - |
Information
Published : 2014-07-25 19:55
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5101
Mitre link : CVE-2014-5101
CVE.ORG link : CVE-2014-5101
JSON object : View
Products Affected
webidsupport
- webid
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')