Reflected Cross-Site Scripting (XSS) in BlackCat CMS
Advisory ID: | HTB23228 |
Product: | BlackCat CMS |
Vendor: | Black Cat Development |
Vulnerable Versions: | 1.0.3 and probably prior |
Tested Version: | 1.0.3 |
Advisory Publication: | August 13, 2014 [without technical details] |
Vendor Notification: | August 13, 2014 |
Vendor Fix: | August 13, 2014 |
Public Disclosure: | September 3, 2014 |
Vulnerability Type: | Cross-Site Scripting [CWE-79] |
CVE Reference: | CVE-2014-5259 |
Risk Level: | Medium |
CVSSv2 Base Score: | 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N) |
Solution Status: | Solution Available |
Discovered and Provided: | High-Tech Bridge Security Research Lab |
Advisory Details: | |
High-Tech Bridge Security Research Lab discovered vulnerability in BlackCat CMS, which can be exploited to perform Cross-Site Scripting (XSS) attacks. | |
Solution: | |
Apply vendor's patch: http://forum.blackcat-cms.org/viewtopic.php?f=2&t=263 | |
References: | |
[1] High-Tech Bridge Advisory HTB23228 - https://www.immuniweb.com/advisory/HTB23228 - Reflected Cross-Site Scripting (XSS) in BlackCat CMS. [2] BlackCat CMS - http://blackcat-cms.org/ - BlackCat CMS ist ein einfach zu bedienendes, übersichtliches und vielseitig einsetzbares Content Management System. [3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures. [4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types. [5] ImmuniWeb® - Leveraging the power of machine-learning and genius of human brain to deliver the most advanced web application security and penetration testing. [6] ImmuniWeb® SSLScan - Test your servers for security and compliance with PCI DSS, HIPAA and NIST. | |
HTB23226: Two Reflected Cross-Site Scripting (XSS) Vulnerabilities in Forma Lms
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.