First published: Thu Dec 10 2009(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in CutePHP CuteNews 1.4.6 and UTF-8 CuteNews before 8b allow remote attackers to inject arbitrary web script or HTML via (1) the result parameter to register.php; (2) the user parameter to search.php; the (3) cat_msg, (4) source_msg, (5) postponed_selected, (6) unapproved_selected, and (7) news_per_page parameters in a list action to the editnews module of index.php; and (8) the link tag in news comments. NOTE: some of the vulnerabilities require register_globals to be enabled and/or magic_quotes_gpc to be disabled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Korn19 Utf-8 Cutenews | =2 | |
Korn19 Utf-8 Cutenews | =3 | |
Korn19 Utf-8 Cutenews | =5 | |
CutePHP CuteNews | =1.4.6 | |
Korn19 Utf-8 Cutenews | =7 | |
Korn19 Utf-8 Cutenews | =4 | |
Korn19 Utf-8 Cutenews | <=8 | |
Korn19 Utf-8 Cutenews | =6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.