Summary
This host is installed with DotCMS and is prone to multiple cross-site scripting vulnerabilities.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
Impact Level: Application
Solution
Upgrade to DotCMS version 2.3.2 or later.
For updates refer to http://dotcms.com/
Insight
The flaw is due to an improper sanitization of Input passed via '_loginUserName', 'my_account_login', 'email' POST parameters to /application/login/login.html, /c/portal_public/login and /dotCMS/forgotPassword scripts respectively.
Affected
DotCMS before version 2.3.2
Detection
Send a crafted data via HTTP GET request and check whether it is able to read cookie or not.
References
Severity
Classification
-
CVE CVE-2013-3484 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- 2532|Gigs Directory Traversal And SQL Injection Multiple Vulnerabilities
- AjaXplorer 'doc_file' Parameter Local File Disclosure Vulnerability
- Adobe ColdFusion Unspecified Information Disclosure Vulnerability
- Apache Archiva Cross Site Request Forgery Vulnerability
- Apache ActiveMQ Source Code Information Disclosure Vulnerability