Vulnerability CVE-2017-14957


Published: 2017-10-01   Modified: 2017-10-02

Description:
Stored XSS vulnerability via a comment in inc/conv.php in BlogoText before 3.7.6 allows an unauthenticated attacker to inject JavaScript. If the victim is an administrator, an attacker can (for example) change global settings or create/delete posts. It is also possible to execute JavaScript against unauthenticated users of the blog.

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Blogotext project -> Blogotext 

 References:
http://openwall.com/lists/oss-security/2017/10/01/1
https://github.com/BlogoText/blogotext/issues/318
https://github.com/BlogoText/blogotext/pull/320/commits/1a283cc8ad2cda37e0a6aff8f4558b98ecbfd9c2
https://github.com/BlogoText/blogotext/releases/tag/3.7.6

Copyright 2024, cxsecurity.com

 

Back to Top