First published: Fri Jun 08 2007(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in atomPhotoBlog.php in Atom PhotoBlog 1.0.9 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) Your Name, (2) Your Homepage, and (3) Your Comment fields, when using "Approve Comments."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apertoblog | <=1.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3134 is classified as a medium severity vulnerability due to the potential for cross-site scripting attacks.
To fix CVE-2007-3134, upgrade to Atom PhotoBlog version 1.1.0 or later where the vulnerabilities are patched.
Users of Atom PhotoBlog versions 1.0.9 and earlier are affected by CVE-2007-3134.
CVE-2007-3134 involves the 'Your Name', 'Your Homepage', and 'Your Comment' fields in the comment approval feature.
Yes, CVE-2007-3134 can lead to data theft through cross-site scripting, allowing attackers to inject malicious scripts.