First published: Wed Feb 08 2012(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in UI/Register.pm in Foswiki before 1.1.5 allow remote authenticated users with CHANGE privileges to inject arbitrary web script or HTML via the (1) text, (2) FirstName, (3) LastName, (4) OrganisationName, (5) OrganisationUrl, (6) Profession, (7) Country, (8) State, (9) Address, (10) Location, (11) Telephone, (12) VoIP, (13) InstantMessagingIM, (14) Email, (15) HomePage, or (16) Comment parameter. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foswiki | =1.1.0 | |
Foswiki | =1.1.1 | |
Foswiki | =1.1.2 | |
Foswiki | =1.1.3 | |
Foswiki | =1.1.4 | |
Foswiki | =1.1.4-beta | |
Foswiki | =1.1.4-rc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1004 is classified as a medium severity vulnerability due to its potential to allow cross-site scripting (XSS) attacks.
To fix CVE-2012-1004, upgrade Foswiki to version 1.1.5 or later.
CVE-2012-1004 affects remote authenticated users with CHANGE privileges in Foswiki versions prior to 1.1.5.
CVE-2012-1004 is a cross-site scripting (XSS) vulnerability that allows script injection.
No, CVE-2012-1004 requires authenticated users with CHANGE privileges to exploit the vulnerability.