CVE-2011-5025
Yaws-Wiki 1.88-1 (Erlang) - Persistent / Reflective Cross-Site Scripting
Severity Score
4.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Multiple cross-site scripting (XSS) vulnerabilities in the wiki application in Yaws 1.88 allow remote attackers to inject arbitrary web script or HTML via (1) the tag parameter to editTag.yaws, (2) the index parameter to showOldPage.yaws, (3) the node parameter to allRefsToMe.yaws, or (4) the text parameter to editPage.yaws.
Varias vulnerabilidades de ejecución de comandos en sitios cruzados (XSS) en la aplicación de wiki en Yaws v1.88 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de (1) el parámetro de etiqueta para editTag.yaws, (2) el parámetro de índice de showOldPage.yaws, (3) el parámetro de nodo a allRefsToMe.yaws , o (4) el parámetro de texto a editPage.yaws.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2011-04-04 First Exploit
- 2011-12-28 CVE Reserved
- 2011-12-29 CVE Published
- 2023-07-29 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/51276 | Vdb Entry | |
https://sitewat.ch/Advisory/View/4 | Url Repurposed |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/17111 | 2011-04-04 | |
https://www.exploit-db.com/exploits/36498 | 2012-01-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|