Search

IQID:11005 HTTP BEdita CMS 3.5.0 - XSS Vulnerability S

The Traffic IQ Library contains over 14,600 articles documenting the latest application exploits and vulnerabilities, security rules to identify and mitigate the threats, along with CVE, CVSS, NVD, OSVDB Security Focus, IBM/ISS and other industry references.

get in touch

Latest News

IQID:11005 HTTP BEdita CMS 3.5.0 - XSS Vulnerability S

IQID: 11005 - June 2015

BEdita contains a flaw that allows a cross-site scripting (XSS) attack. This flaw exists because the /index.php/newsletter/saveMailGroups script does not validate input to the 'data[MailGroup][group_name]' POST parameter before returning it to users. This may allow a remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.

A Full Description is available for this threat, please sign in for access to Full Description.


 

Attack Data

Attack Data is available for this threat, please sign in for access to Attack Data.


 

CVSS Information

CVSS Information is available for this threat, please sign in for access to CVSS Information.


 

Date

Date Information is available for this threat, please sign in for access to Date Information.


 

External Resources

External resources are available for this threat, please sign in for access to external resources.


 

Security Rule

A security rule is available to identify this threat, please sign in for access to security rules.


 

Permalink

Link directly to this page.

http://www.idappcom.com/db/?11005


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.