Exponent CMS 2.3.5 Cross-Site Scripting Vulnerability
Reported by Sachin Wagh | December 24th, 2015 @ 08:39 AM | in 2.3.6 (closed)
Exponent CMS 2.3.5 Cross-Site Scripting Vulnerability
Information
Vulnerability Type : Exponent CMS 2.3.5 Cross-Site Scripting
Vulnerability
Vulnerable Version : 2.3.5
CVE-ID :
Severity: High
Author – Sachin Wagh (@tiger_tigerboy)
Description
Exponent CMS is prone to a Cross-site scripting vulnerability because it fails to sanitize user-supplied input ‘Username/Email’ field of ‘Reset Your Password’ module . An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site.
Credits & Authors
Sachin Wagh (@tiger_tigerboy)
Comments and changes to this ticket
-
dleffler December 24th, 2015 @ 03:30 PM
- Tag set to security
- Assigned user changed from expNinja to dleffler
- Milestone set to 2.3.6
Yes, we do not currently check for img tag hacks. This will be fixed shortly.
-
expNinja December 24th, 2015 @ 03:32 PM
- State changed from new to resolved
(from [3ea25aadd83935b04b4c5e31518a7b05a8220cad]) Update input santization for security issues using code gleaned from CodeIgniter project [#1320 state:resolved] https://github.com/exponentcms/exponent-cms/commit/3ea25aadd83935b0...
-
dleffler December 24th, 2015 @ 04:04 PM
I've requested a CVE-ID (but I've never used this process before since I'm just a coder)
-
Sachin Wagh December 24th, 2015 @ 04:07 PM
Thanks dleffler.
Once assigned CVE-ID please let me know.
Thanks a lot.
Please Sign in or create a free account to add a new ticket.
With your very own profile, you can contribute to projects, track your activity, watch tickets, receive and update tickets through your email and much more.
Create your profile
Help contribute to this project by taking a few moments to create your personal profile. Create your profile ยป
Bug Tracker for Exponent CMS