- Document cgiwrap XSS vulnerability
PR: ports/130277 Submitted by: Eric W. Bates <ericx@vineyard.net>
This commit is contained in:
parent
07a8d1910a
commit
914d59516e
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=225916
@ -34,6 +34,38 @@ Note: Please add new entries to the beginning of this file.
|
||||
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="bc6a7e79-e111-11dd-afcd-00e0815b8da8">
|
||||
<topic>cgiwrap -- XSS Vulnerability</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>cgiwrap</name>
|
||||
<range><lt>4.0_2</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>Secunia reports:</p>
|
||||
<blockquote cite="">
|
||||
<p>A vulnerability has been reported in CGIWrap, which can be
|
||||
exploited by malicious people to conduct cross-site scripting
|
||||
attacks.</p>
|
||||
<p>The vulnerability is caused due to the application generating
|
||||
error messages without specifying a charset. This can be exploited
|
||||
to execute arbitrary HTML and script code in a user's browser
|
||||
session in context of an affected site.</p>
|
||||
<p>Successful exploitation may require that the victim uses Internet Explorer or a browser based on Internet Explorer components.</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CVE-2008-2852</cvename>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2008-06-19</discovery>
|
||||
<entry>2009-01-13</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="d4a358d3-e09a-11dd-a765-0030843d3802">
|
||||
<topic>nagios -- web interface privilege escalation vulnerability</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user