First published: Thu Dec 30 2010(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in XWiki Watch 1.0 allow remote attackers to inject arbitrary web script or HTML via the rev parameter to (1) bin/viewrev/Main/WebHome and (2) bin/view/Blog, and the (3) register_first_name and (4) register_last_name parameters to bin/register/XWiki/Register. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki Xwiki Watch | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4640 is classified as a moderate severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2010-4640, users should upgrade to a version of XWiki Watch that addresses these cross-site scripting vulnerabilities.
CVE-2010-4640 is caused by insufficient input validation, allowing attackers to inject arbitrary web scripts through vulnerable parameters.
CVE-2010-4640 affects XWiki Watch version 1.0.
The potential impacts of CVE-2010-4640 include unauthorized access to user sessions, defacement of web pages, and phishing attacks.