Multiple cross-site scripting (XSS) vulnerabilities in index.php in Shaarli allow remote attackers to inject arbitrary web script or HTML via the URL to the (1) showRSS, (2) showATOM, or (3) showDailyRSS function; a (4) file name to the importFile function; or (5) vectors related to bookmarks.
References
Link | Resource |
---|---|
http://seclists.org/oss-sec/2014/q2/4 | Exploit Mailing List Patch Third Party Advisory |
https://github.com/sebsauvage/Shaarli/commit/53da201749f8f362323ef278bf338f1d9f7a925a | Patch Third Party Advisory |
http://seclists.org/oss-sec/2014/q2/1 | Exploit Mailing List Patch Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/92215 | Third Party Advisory VDB Entry |
https://github.com/sebsauvage/Shaarli/issues/134 | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-01-02 12:15
Updated : 2020-01-09 12:15
NVD link : CVE-2013-7351
Mitre link : CVE-2013-7351
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
shaarli_project
- shaarli