Multiple cross-site scripting (XSS) vulnerabilities in PHD Help Desk 1.43 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to area.php; the (2) pagina, (3) sentido, (4) q_registros, and (5) orden parameters to area.php; (6) the q_registros parameter to solic_display.php; (7) the PATH_INFO to area_list.php; (8) the q_registros parameter to area_list.php; (9) the PATH_INFO to atributo.php; the (10) pagina, (11) q_registros, and (12) orden parameters to atributo_list.php; (13) an arbitrary parameter name beginning with "sentido" to atributo_list.php; and (14) the PATH_INFO to caso_insert.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
References
Link | Resource |
---|---|
http://osvdb.org/60090 | |
http://osvdb.org/60088 | |
http://osvdb.org/60089 | |
http://secunia.com/advisories/37375 | Exploit Vendor Advisory |
http://osvdb.org/60086 | |
http://www.securityfocus.com/bid/37029 | Exploit |
http://osvdb.org/60087 | |
http://osvdb.org/60085 |
Configurations
Information
Published : 2009-11-23 09:30
Updated : 2009-11-23 09:30
NVD link : CVE-2009-4047
Mitre link : CVE-2009-4047
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
p-hd
- phd_help_desk