Description
Multiple cross-site scripting (XSS) vulnerabilities in Jinzora Media Jukebox 2.7.5 allow remote attackers to inject arbitrary web script or HTML via the (1) frontend, (2) set_frontend, (3) jz_path, (4) theme, and (5) set_theme parameters to (a) index.php; the frontend, theme, and (6) language parameters to (b) ajax_request.php; the jz_path parameter to (c) slim.php; the frontend, theme, and jz_path parameters to (d) popup.php; the (13) PATH_INFO to index.php and (e) slim.php; and the (14) query parameter in a playlistedit action and (15) siteNewsData parameter in a sitenews action to (f) popup.php.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Alexandr Polyakov · textwebappsphp
https://www.exploit-db.com/exploits/31237
exploitdb
WORKING POC
VERIFIED
by Alexandr Polyakov · textwebappsphp
https://www.exploit-db.com/exploits/31238
exploitdb
WORKING POC
VERIFIED
by Alexandr Polyakov · textwebappsphp
https://www.exploit-db.com/exploits/31235
exploitdb
WORKING POC
VERIFIED
by Alexandr Polyakov · textwebappsphp
https://www.exploit-db.com/exploits/31236
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/27876
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/29023
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3683
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/488326/100/0/threaded
Scores
EPSS
0.0049
EPSS Percentile
65.6%
Details
CWE
CWE-79
Status
published
Products (1)
jinzora/media_jukebox
2.7.5
Published
Feb 21, 2008
Tracked Since
Feb 18, 2026