Description
|
|
A vulnerability has been discovered in Sharetronix, which can be exploited by malicious people to conduct cross-site scripting attacks.
Input passed via the "email" POST parameter to the signup page is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Successful exploitation requires that the victim is logged out and that the "Email confirmation" option is enabled (enabled by default).
The vulnerability is confirmed in versions 3.1.1 and 3.1.1.3. Other versions may also be affected.
|