First published: Wed Dec 31 2014(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Smoothwall Express 3.1 and 3.0 SP3 allow remote attackers to inject arbitrary web script or HTML via the (1) PROFILENAME parameter in a Save action to httpd/cgi-bin/pppsetup.cgi or (2) COMMENT parameter in an Add action to httpd/cgi-bin/ddns.cgi.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Smoothwall Smoothwall | =3.0-sp3 | |
Smoothwall Smoothwall | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9429 is considered to be of medium severity due to its potential for cross-site scripting attacks.
To fix CVE-2014-9429, apply the latest patches provided by Smoothwall for versions 3.0 SP3 and 3.1.
CVE-2014-9429 affects Smoothwall Express versions 3.0 SP3 and 3.1.
Attackers can exploit CVE-2014-9429 through the PROFILENAME and COMMENT parameters in specific CGI scripts.
Yes, exploitation of CVE-2014-9429 could allow attackers to inject arbitrary scripts, potentially leading to data leakage.