Description
|
|
Omar Kurt has discovered multiple vulnerabilities in e107, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks.
1) Input passed via the "comment" POST parameter to /news.php is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed.
Successful exploitation of this vulnerability requires a news item with the "Allow comments to be posted to this news item" option enabled.
2) Input passed via the "multilanguage_subdomain" POST parameter to /e107_admin/language.php and via the the "meta_author" POST parameter to /e107_admin/meta.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are confirmed in version 1.0.4. Other versions may also be affected.
|