First published: Thu Jan 02 2020(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in GetSimple CMS before 3.2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to backup-edit.php; (2) title or (3) menu parameter to edit.php; or (4) path or (5) returnid parameter to filebrowser.php in admin/. NOTE: the path parameter in admin/upload.php vector is already covered by CVE-2012-6621.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Get-simple Getsimple Cms | <3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1420 is a vulnerability in GetSimple CMS before version 3.2.1 that allows remote attackers to inject arbitrary web script or HTML.
CVE-2013-1420 has a severity level of 6.1, which is considered medium.
Remote attackers can exploit CVE-2013-1420 by injecting arbitrary web script or HTML via certain parameters in GetSimple CMS.
GetSimple CMS versions before 3.2.1 are affected by CVE-2013-1420.
Yes, you can find more information about CVE-2013-1420 at the following references: [1] http://archives.neohapsis.com/archives/bugtraq/2013-05/0005.html [2] http://get-simple.info/changelog [3] https://www.htbridge.com/advisory/HTB23141