First published: Fri May 20 2011(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in TemplateLogin.pm in TWiki before 5.0.2 allow remote attackers to inject arbitrary web script or HTML via the origurl parameter to a (1) view script or (2) login script.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Twiki Twiki | =4.1.1 | |
Twiki Twiki | =4.0.1 | |
Twiki Twiki | =4.2.3 | |
Twiki Twiki | =4.2.4 | |
Twiki Twiki | =4.3.0 | |
Twiki Twiki | =4.3.2 | |
Twiki Twiki | =4.0.3 | |
Twiki Twiki | =4.0.4 | |
Twiki Twiki | =4.2.1 | |
Twiki Twiki | =4.2.0 | |
Twiki Twiki | =4.0.0 | |
Twiki Twiki | =4.5.0 | |
Twiki Twiki | =4.1.0 | |
Twiki Twiki | =4.3.1 | |
Twiki Twiki | =5.0.0 | |
Twiki Twiki | =4.2.2 | |
Twiki Twiki | <=5.0.1 | |
Twiki Twiki | =4.0.2 | |
Twiki Twiki | =4.0.5 | |
Twiki Twiki | =4.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1838 has been classified as a medium severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2011-1838, upgrade to TWiki version 5.0.2 or later to eliminate the vulnerabilities.
The potential impacts of CVE-2011-1838 include unauthorized script execution in the context of a user's browser, which can lead to data theft or session hijacking.
CVE-2011-1838 affects TWiki versions 4.0.0 through 5.0.1.
Yes, CVE-2011-1838 can be exploited remotely by attackers using crafted URLs.