Multiple cross-site scripting (XSS) vulnerabilities in index.php in Shaarli allow remote attackers to inject arbitrary web script or HTML via the URL to the (1) showRSS, (2) showATOM, or (3) showDailyRSS function; a (4) file name to the importFile function; or (5) vectors related to bookmarks.
References
| Link | Resource |
|---|---|
| http://seclists.org/oss-sec/2014/q2/4 | Exploit Mailing List Patch Third Party Advisory |
| https://github.com/sebsauvage/Shaarli/commit/53da201749f8f362323ef278bf338f1d9f7a925a | Patch Third Party Advisory |
| http://seclists.org/oss-sec/2014/q2/1 | Exploit Mailing List Patch Third Party Advisory |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/92215 | Third Party Advisory VDB Entry |
| https://github.com/sebsauvage/Shaarli/issues/134 | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-01-02 20:15
Updated : 2020-01-09 20:15
NVD link : CVE-2013-7351
Mitre link : CVE-2013-7351
JSON object : View
Products Affected
shaarli_project
- shaarli
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
