Multiple cross-site scripting (XSS) vulnerabilities in the HMS Testimonials plugin before 2.0.11 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) image, (3) url, or (4) testimonial parameter to the Testimonial form (hms-testimonials-addnew page); (5) date_format parameter to the Settings - Default form (hms-testimonials-settings page); (6) name parameter in a Save action to the Settings - Custom Fields form (hms-testimonials-settings-fields page); or (7) name parameter in a Save action to the Settings - Template form (hms-testimonials-templates-new page).
References
Link | Resource |
---|---|
http://seclists.org/oss-sec/2013/q3/345 | Mailing List Third Party Advisory |
http://seclists.org/oss-sec/2013/q3/361 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2013/Aug/98 | Exploit Mailing List Third Party Advisory |
https://wordpress.org/plugins/hms-testimonials/#developers | Release Notes |
http://seclists.org/fulldisclosure/2013/Aug/96 | Exploit Mailing List Third Party Advisory |
Configurations
Information
Published : 2020-01-30 13:15
Updated : 2020-02-03 13:02
NVD link : CVE-2013-4241
Mitre link : CVE-2013-4241
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
hitmyserver
- hms_testimonials