Description
Multiple cross-site scripting (XSS) vulnerabilities in glFusion before 1.2.2.pl4 allow remote attackers to inject arbitrary web script or HTML via the (1) subject parameter to profiles.php; (2) address1, (3) address2, (4) calendar_type, (5) city, (6) state, (7) title, (8) url, or (9) zipcode parameter to calendar/index.php; (10) title or (11) url parameter to links/index.php; or (12) PATH_INFO to admin/plugins/mediagallery/xppubwiz.php/.
Exploits (1)
exploitdb
WORKING POC
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/24536
References (7)
Core 7
Core References
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/24536
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/52255
Vendor Advisory x_refsource_misc
https://www.htbridge.com/advisory/HTB23142
Exploit, Third Party Advisory x_refsource_misc
http://packetstormsecurity.com/files/120423/glFusion-1.2.2-Cross-Site-Scripting.html
Patch, Vendor Advisory x_refsource_confirm
http://www.glfusion.org/article.php/glf122_update_20130130_01
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/82211
Third Party Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2013-02/0093.html
Scores
EPSS
0.0871
EPSS Percentile
92.6%
Details
CWE
CWE-79
Status
published
Products (41)
glfusion/glfusion
1.0.0 (3 CPE variants)
glfusion/glfusion
1.0.1
glfusion/glfusion
1.0.2
glfusion/glfusion
1.1.0 (2 CPE variants)
glfusion/glfusion
1.1.1
glfusion/glfusion
1.1.2
glfusion/glfusion
1.1.3
glfusion/glfusion
1.1.4
glfusion/glfusion
1.1.4.pl1
glfusion/glfusion
1.1.4.pl2
... and 31 more
Published
Feb 05, 2014
Tracked Since
Feb 18, 2026