Multiple cross-site scripting (XSS) vulnerabilities in the web administration frontend in the httpd package in fli4l before 3.10.1 and 4.0 before 2015-01-30 allow remote attackers to inject arbitrary web script or HTML via the (1) conntrack.cgi, (2) index.cgi, (3) log_syslog.cgi, (4) problems.cgi, (5) status.cgi, (6) status_network.cgi, or (7) status_system.cgi script in admin/.
References
Link | Resource |
---|---|
http://seclists.org/oss-sec/2015/q1/376 | Mailing List Third Party Advisory |
http://seclists.org/oss-sec/2015/q1/381 | Mailing List Third Party Advisory |
http://www.fli4l.de/fileadmin/fli4l/security/advisory-FFL-1113.txt | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/100610 | VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2015-02-06 15:59
Updated : 2024-02-04 18:35
NVD link : CVE-2015-1444
Mitre link : CVE-2015-1444
CVE.ORG link : CVE-2015-1444
JSON object : View
Products Affected
fli4l
- fli4l
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')