Description
Multiple cross-site scripting (XSS) vulnerabilities in oBlog allow remote attackers to inject arbitrary web script or HTML via the (1) commentName, (2) commentEmail, (3) commentWeb, or (4) commentText parameter to article.php; and allow remote authenticated administrators to inject arbitrary web script or HTML via the (5) article_id or (6) title parameter to admin/write.php, the (7) category_id or (8) category_name parameter to admin/groups.php, the (9) blogroll_id or (10) title parameter to admin/blogroll.php, or the (11) blog_name or (12) tag_line parameter to admin/settings.php.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Milos Zivanovic · textwebappsphp
https://www.exploit-db.com/exploits/10379
References (4)
Core 4
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/37661
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/54713
Exploit x_refsource_misc
http://packetstormsecurity.org/0912-exploits/oblog-xssxsrf.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/60906
Scores
EPSS
0.0265
EPSS Percentile
85.8%
Details
CWE
CWE-79
Status
published
Products (1)
dootzky/oblog
Published
Jun 25, 2010
Tracked Since
Feb 18, 2026