pysec-2014-16
Vulnerability from pysec
Published
2014-04-11 15:55
Modified
2021-07-05 00:01
Details
Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via the @action parameter to support/issue1.
Aliases
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "roundup", "purl": "pkg:pypi/roundup" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.4.20" } ], "type": "ECOSYSTEM" } ], "versions": [ "0.5.9", "0.6.11", "0.6.8", "0.6.9", "0.7.0", "0.7.0b3", "0.7.1", "0.7.11", "0.7.12", "0.7.2", "0.7.3", "0.7.4", "0.7.5", "0.7.7", "0.7.8", "0.7.9", "0.8.0", "0.8.0b1", "0.8.1", "0.8.2", "0.8.3", "0.8.4", "0.8.5", "0.8.6", "0.9.0b1", "1.0", "1.0.1", "1.1.0", "1.1.1", "1.1.2", "1.2.0", "1.2.1", "1.3.0", "1.3.1", "1.3.2", "1.3.3", "1.4.0", "1.4.1", "1.4.10", "1.4.11", "1.4.12", "1.4.13", "1.4.14", "1.4.15", "1.4.16", "1.4.17", "1.4.18", "1.4.19", "1.4.2", "1.4.3", "1.4.4", "1.4.5.1", "1.4.6", "1.4.7", "1.4.8", "1.4.9" ] } ], "aliases": [ "CVE-2012-6131" ], "details": "Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via the @action parameter to support/issue1.", "id": "PYSEC-2014-16", "modified": "2021-07-05T00:01:25.823373Z", "published": "2014-04-11T15:55:00Z", "references": [ { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2013/02/13/8" }, { "type": "WEB", "url": "http://issues.roundup-tracker.org/issue2550711" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2012/11/10/2" }, { "type": "WEB", "url": "https://pypi.python.org/pypi/roundup/1.4.20" }, { "type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722672" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84190" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.