CVE-2008-7213
Mambo Module MOStlyCE 2.4 - 'connector.php' Cross-Site Scripting
Severity Score
4.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
3
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Cross-site scripting (XSS) vulnerability in mambots/editors/mostlyce/jscripts/tiny_mce/filemanager/connectors/php/connector.php in MOStlyCE before 2.4, as used in Mambo 4.6.3 and earlier, allows remote attackers to inject arbitrary web script or HTML via the Command parameter.
Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en mambots/editors/mostlyce/jscripts/tiny_mce/filemanager/connectors/php/connector.php en MOStlyCE y anteriores a la v2.4, como la usada en Mambo v4.6.3 y anteriores, permite a los atacantes remotos inyectar arbitrariamente una secuencia de comandos web o HTML a través del parámetro Command.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2008-01-28 First Exploit
- 2009-09-11 CVE Reserved
- 2009-09-11 CVE Published
- 2023-12-15 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2008-02/0444.html | Mailing List | |
http://forum.mambo-foundation.org/showthread.php?t=10158 | X_refsource_confirm | |
http://osvdb.org/42530 | Vdb Entry | |
http://www.securityfocus.com/archive/1/487128/100/200/threaded | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/39984 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/31066 | 2008-01-28 | |
http://www.bugreport.ir/index_33.htm | 2024-08-07 | |
http://www.securityfocus.com/bid/27470 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/28670 | 2018-10-11 | |
http://www.vupen.com/english/advisories/2008/0325 | 2018-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mambo-foundation Search vendor "Mambo-foundation" | Mambo Search vendor "Mambo-foundation" for product "Mambo" | <= 4.6.3 Search vendor "Mambo-foundation" for product "Mambo" and version " <= 4.6.3" | - |
Affected
| in | Brilaps Search vendor "Brilaps" | Mostlyce Search vendor "Brilaps" for product "Mostlyce" | <= 2.0 Search vendor "Brilaps" for product "Mostlyce" and version " <= 2.0" | - |
Affected
|
Mambo-foundation Search vendor "Mambo-foundation" | Mambo Search vendor "Mambo-foundation" for product "Mambo" | 4.6.2 Search vendor "Mambo-foundation" for product "Mambo" and version "4.6.2" | - |
Affected
| in | Brilaps Search vendor "Brilaps" | Mostlyce Search vendor "Brilaps" for product "Mostlyce" | <= 2.0 Search vendor "Brilaps" for product "Mostlyce" and version " <= 2.0" | - |
Affected
|