![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.900372 |
Categoría: | Web application abuses |
Título: | LightNEasy < 2.2.1 / 2.2.2 XSS Vulnerability |
Resumen: | LightNEasy is prone to a cross-site scripting (XSS); vulnerability. |
Descripción: | Summary: LightNEasy is prone to a cross-site scripting (XSS) vulnerability. Vulnerability Insight: The following flaws exist: - Input passed to the 'commentname', 'commentemail' and 'commentmessage' parameters when posting a comment is not properly sanitised before being used. - Input passed via the 'page' parameter to LightNEasy.php is not properly sanitised before being used to read files and can be exploited by directory traversal attacks. Vulnerability Impact: Successful exploitation will allow attacker to inject arbitrary HTML and script code, which will be executed when the malicious comment is viewed and disclose the content of arbitrary files on an affected system. Affected Software/OS: LightNEasy version 2.2.1 and prior (no database) and LightNEasy version 2.2.2 and prior (SQLite). Solution: Update to version 3.1 or later. CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-1937 BugTraq ID: 35229 http://www.securityfocus.com/bid/35229 Bugtraq: 20090603 [InterN0T] LightNEasy 2.2.2 - HTML Injection Vulnerability (Google Search) http://www.securityfocus.com/archive/1/504092/100/0/threaded http://forum.intern0t.net/intern0t-advisories/1081-intern0t-lightneasy-2-2-2-html-injection-vulnerability.html http://secunia.com/advisories/35354 |
Copyright | Copyright (C) 2009 Greenbone Networks GmbH |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |