CVE-2012-1664

Current Description

Multiple cross-site scripting (XSS) vulnerabilities in the admin panel in osCMax before 2.5.1 allow remote attackers to inject arbitrary web script or HTML via the (1) username parameter in a process action to admin/login.php; (2) pageTitle, (3) current_product_id, or (4) cPath parameter to admin/new_attributes_include.php; (5) sb_id, (6) sb_key, (7) gc_id, (8) gc_key, or (9) path parameter to admin/htaccess.php; (10) title parameter to admin/information_form.php; (11) search parameter to admin/xsell.php; (12) gross or (13) max parameter to admin/stats_products_purchased.php; (14) status parameter to admin/stats_monthly_sales.php; (15) sorted parameter to admin/stats_customers.php; (16) information_id parameter to /admin/information_manager.php; or (17) zID parameter to /admin/geo_zones.php.

Basic Data

PublishedMay 20, 2015
Last ModifiedMay 21, 2015
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-79
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score4.3
SeverityMEDIUM
Exploitability Score8.6
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationOscmaxOscmax********2.5.0

Vulnerable Software List

VendorProductVersions
Oscmax Oscmax *

References

NameSourceURLTags
20120404 Multiple vulnerabilities in osCmaxhttp://archives.neohapsis.com/archives/bugtraq/2012-04/0021.htmlBUGTRAQ
http://bugtrack.oscmax.com/view.php?id=1165http://bugtrack.oscmax.com/view.php?id=1165CONFIRM
http://www.oscmax.com/blog/michael_s/oscmax_v251_has_been_released_security_updatehttp://www.oscmax.com/blog/michael_s/oscmax_v251_has_been_released_security_updateCONFIRMPATCH Vendor Advisory
80903http://www.osvdb.org/80903OSVDB
80904http://www.osvdb.org/80904OSVDB
80905http://www.osvdb.org/80905OSVDB
80906http://www.osvdb.org/80906OSVDB
80907http://www.osvdb.org/80907OSVDB
80908http://www.osvdb.org/80908OSVDB
80909http://www.osvdb.org/80909OSVDB
80910http://www.osvdb.org/80910OSVDB
80911http://www.osvdb.org/80911OSVDB
80912http://www.osvdb.org/80912OSVDB
https://www.htbridge.com/advisory/HTB23081https://www.htbridge.com/advisory/HTB23081MISCExploit