WeBid version up to current version 1.2.2 contains a Cross Site Scripting (XSS) vulnerability in user_login.php, register.php that can result in Javascript execution in the user's browser, injection of malicious markup into the page. This attack appear to be exploitable via The victim user must click a malicous link. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f.
References
Link | Resource |
---|---|
https://telekomsecurity.github.io/assets/advisories/20181108_WeBid_Multiple_Vulnerabilities.txt | Exploit Third Party Advisory |
https://github.com/renlok/WeBid/commit/256a5f9d3eafbc477dcf77c7682446cc4b449c7f | Patch |
http://bugs.webidsupport.com/view.php?id=648 | Issue Tracking Release Notes Vendor Advisory |
Configurations
Information
Published : 2018-12-20 09:29
Updated : 2019-01-07 12:54
NVD link : CVE-2018-1000868
Mitre link : CVE-2018-1000868
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
webidsupport
- webid