Description
Multiple cross-site scripting (XSS) vulnerabilities in ATutor before 2.1 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) themes/default/tile_search/index.tmpl.php, (2) login.php, (3) search.php, (4) password_reminder.php, (5) login.php/jscripts/infusion, (6) login.php/mods/_standard/flowplayer, (7) browse.php/jscripts/infusion/framework/fss, (8) registration.php/themes/default/ie_styles.css, (9) about.php, or (10) themes/default/social/basic_profile.tmpl.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Stefan Schurtz · textwebappsphp
https://www.exploit-db.com/exploits/36565
References (6)
Core 6
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/51423
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/72412
Exploit mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-01/0094.html
Various Sources x_refsource_confirm
http://atutor.ca/atutor/change_log.php
Exploit x_refsource_misc
http://www.darksecurity.de/advisories/2012/SSCHADV2012-002.txt
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/47597
Scores
EPSS
0.0631
EPSS Percentile
91.1%
Details
CWE
CWE-79
Status
published
Products (25)
atutor/atutor
1.0
atutor/atutor
1.2.1
atutor/atutor
1.2.2
atutor/atutor
1.3
atutor/atutor
1.3.1
atutor/atutor
1.3.2
atutor/atutor
1.3.3
atutor/atutor
1.4
atutor/atutor
1.4.1
atutor/atutor
1.4.2
... and 15 more
Published
Jan 31, 2013
Tracked Since
Feb 18, 2026