First published: Fri Jan 17 2014(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in GetSimple CMS 3.1.2 and 3.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) post-menu field to edit.php or (2) Display name field to settings.php. NOTE: The Custom Permalink Structure and Email Address fields are already covered by CVE-2012-6621.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GetSimple CMS | =3.1.2 | |
GetSimple CMS | =3.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7243 allows remote attackers to inject arbitrary web scripts or HTML into affected GetSimple CMS installations.
CVE-2013-7243 specifically affects GetSimple CMS versions 3.1.2 and 3.2.3.
Mitigation for CVE-2013-7243 involves updating to a patched version of GetSimple CMS that is not vulnerable to these XSS attacks.
CVE-2013-7243 contains multiple cross-site scripting vulnerabilities that can be exploited through the post-menu and display name fields.
The specific fix for CVE-2013-7243 requires updating to a secure version of GetSimple CMS that addresses these vulnerabilities.