#VU44137 Cross-site scripting in Plume CMS - CVE-2012-2156
Published: April 11, 2012 / Updated: August 11, 2020
Plume CMS
plume-cms.net
Description
Vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in Plume CMS 1.2.4 and earlier when processing (1) the u_email parameter (aka Authors Email field) to manager/users.php, (2) the u_realname parameter (aka Authors Name field) to manager/users.php, or (3) the c_author parameter (aka Author field) in an ADD A COMMENT section. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
External links
- http://osvdb.org/80960
- http://osvdb.org/80961
- http://www.exploit-db.com/exploits/18699
- http://www.securityfocus.com/bid/52890
- http://www.webapp-security.com/2012/04/plumecms
- http://www.webapp-security.com/wp-content/uploads/2012/04/PlumeCMS-1.2.4-Multiple-Permanent-XSS.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74614