#VU45371 Cross-site scripting in PivotX - CVE-2011-0772
Published: February 4, 2011 / Updated: August 11, 2020
PivotX
pivotlog.net
Description
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in PivotX 2.2.0, and possibly other versions before 2.2.2, when processing the (1) color parameter to includes/blogroll.php or (2) src parameter to includes/timwrapper.php. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
External links
- http://blog.pivotx.net/archive/2011/01/11/pivotx-222-released
- http://pivot-weblog.svn.sf.net/viewvc/pivot-weblog?view=revision&revision=3409
- http://pivot-weblog.svn.sf.net/viewvc/pivot-weblog?view=revision&revision=3410
- http://secunia.com/advisories/43040
- http://securityreason.com/securityalert/8062
- http://www.htbridge.ch/advisory/xss_in_pivotx.html
- http://www.htbridge.ch/advisory/xss_in_pivotx_1.html
- http://www.osvdb.org/70673
- http://www.osvdb.org/70674
- http://www.securityfocus.com/archive/1/515958/100/0/threaded
- http://www.securityfocus.com/archive/1/515964/100/0/threaded
- http://www.securityfocus.com/bid/45996
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64975