Multiple cross-site scripting (XSS) vulnerabilities in the administrative backend in BEdita 3.4.0 allow remote authenticated users to inject arbitrary web script or HTML via the (1) lrealname field in the editProfile form to index.php/home/profile; the (2) data[title] or (3) data[description] field in the addQuickItem form to index.php; the (4) "note text" field in the saveNote form to index.php/areas; or the (5) titleBEObject or (6) tagsArea field in the updateForm form to index.php/documents/view.
References
Configurations
History
21 Nov 2024, 02:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/129865/CMS-BEdita-3.4.0-Cross-Site-Scripting.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2015/Jan/16 - Exploit | |
References | () http://seclists.org/oss-sec/2015/q1/115 - Exploit | |
References | () http://sroesemann.blogspot.de/2014/12/sroeadv-2014-10.html - Exploit | |
References | () http://www.securityfocus.com/bid/71949 - Exploit | |
References | () https://github.com/bedita/bedita/issues/566 - |
Information
Published : 2015-01-15 15:59
Updated : 2024-11-21 02:24
NVD link : CVE-2015-1040
Mitre link : CVE-2015-1040
CVE.ORG link : CVE-2015-1040
JSON object : View
Products Affected
bedita
- bedita
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')