This host is running ArticleSetup and is prone to multiple cross-site scripting and SQL injection vulnerabilities.
Successful exploitation will allow attackers to execute arbitrary web script or HTML in a user's browser session in the context of an affected site and manipulate SQL queries by injecting arbitrary SQL code. Impact Level: Application
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Multiple flaws are due to an, - Input passed to 'userid' and 'password' parameter in '/upload/login.php' and '/upload/admin/login.php' page is not properly verified before being used. - Input passed to the 'cat' parameter in 'upload/feed.php', 's' parameter in 'upload/search.php', 'id' parameter in '/upload/admin/pageedit.php', 'upload/admin/authoredit.php' and '/admin/categoryedit.php' pages are not properly verified before being used. - Input passed to the 'title' parameter in 'upload//author/submit.php', '/upload/admin/articlenew.php', '/upload/admin/categories.php' and '/upload/admin/pages.php' pages are not properly verified before being used.
ArticleSetup version 1.11 and prior
Updated on 2017-03-28
- Apache Tomcat/JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) Marshalled Object Remote Code Execution
- Apache Archiva Multiple Remote Command Execution Vulnerabilities
- Apache Solr XML External Entity(XXE) Vulnerability-02 Jan-14
- ActivePerl perlIS.dll Buffer Overflow
- ATutor password reminder SQL injection