CVE-2009-4908

Dootzky Oblog - XSS

Title source: rule
STIX 2.1

Description

Multiple cross-site scripting (XSS) vulnerabilities in oBlog allow remote attackers to inject arbitrary web script or HTML via the (1) commentName, (2) commentEmail, (3) commentWeb, or (4) commentText parameter to article.php; and allow remote authenticated administrators to inject arbitrary web script or HTML via the (5) article_id or (6) title parameter to admin/write.php, the (7) category_id or (8) category_name parameter to admin/groups.php, the (9) blogroll_id or (10) title parameter to admin/blogroll.php, or the (11) blog_name or (12) tag_line parameter to admin/settings.php.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Milos Zivanovic · textwebappsphp
https://www.exploit-db.com/exploits/10379

References (4)

Core 4
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/37661
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/54713
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/60906

Scores

EPSS 0.0265
EPSS Percentile 85.8%

Details

CWE
CWE-79
Status published
Products (1)
dootzky/oblog
Published Jun 25, 2010
Tracked Since Feb 18, 2026