First published: Sun Apr 27 2008(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the user account creation feature in Exponent CMS 0.96.6-GA20071003 and earlier, when the Allow Registration? configuration option is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) username, (2) firstname, (3) lastname, and (4) e-mail address fields. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oicgroup Exponent Cms | =0.96.6 | |
Oicgroup Exponent Cms | =0.96.4 | |
Oicgroup Exponent Cms | =0.95 | |
Oicgroup Exponent Cms | =0.96.6-alpha | |
Oicgroup Exponent Cms | =0.94 | |
Oicgroup Exponent Cms | =0.96.3 | |
Oicgroup Exponent Cms | <=0.96.6-ga20071003 | |
Oicgroup Exponent Cms | =0.96.5-rc1 | |
Oicgroup Exponent Cms | =0.96.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1972 is considered a medium severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2008-1972, disable the user registration feature if it's not needed or ensure proper input validation and encoding are implemented.
CVE-2008-1972 affects Exponent CMS versions 0.96.6 and earlier, including 0.96.5, 0.96.4, 0.96.3, 0.96.1, and earlier versions.
CVE-2008-1972 allows remote attackers to perform cross-site scripting (XSS) attacks by injecting malicious scripts through user account creation fields.
There is no specific patch mentioned for CVE-2008-1972; users are advised to apply appropriate input validation measures.