First published: Mon Jul 21 2014(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in LimeSurvey 2.05+ Build 140618 allow remote attackers to inject arbitrary web script or HTML via (1) the pid attribute to the getAttribute_json function to application/controllers/admin/participantsaction.php in CPDB, (2) the sa parameter to application/views/admin/globalSettings_view.php, or (3) a crafted CSV file to the "Import CSV" functionality.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
LimeSurvey | =2.05\+ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5016 is rated to have a medium severity due to the potential for cross-site scripting (XSS) attacks.
To fix CVE-2014-5016, upgrade LimeSurvey to a version later than 2.05+ Build 140618 that includes the necessary security patches.
CVE-2014-5016 allows remote attackers to perform cross-site scripting (XSS) attacks, which can lead to arbitrary script execution in the context of the user's browser.
LimeSurvey versions 2.05+ Build 140618 and earlier are affected by CVE-2014-5016.
CVE-2014-5016 exploits multiple XSS vulnerabilities via the pid attribute in getAttribute_json and the sa parameter in various requests.