Vulnerability Description
Cross-site scripting (XSS) vulnerability in add_comment.php in Light Blog 4.1 before 20070606 allows remote attackers to inject arbitrary web script or HTML via the id parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Public Warehouse | Light Blog | 4.1 |
References
- http://secunia.com/advisories/25561
- http://securityreason.com/securityalert/2783
- http://www.securityfocus.com/archive/1/470673/100/0/threaded
- http://www.secvsn.com/content/Advisories/sr-060607-lightblog.htmlExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34753
- http://secunia.com/advisories/25561
- http://securityreason.com/securityalert/2783
- http://www.securityfocus.com/archive/1/470673/100/0/threaded
- http://www.secvsn.com/content/Advisories/sr-060607-lightblog.htmlExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34753
FAQ
What is CVE-2007-3131?
CVE-2007-3131 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Cross-site scripting (XSS) vulnerability in add_comment.php in Light Blog 4.1 before 20070606 allows remote attackers to inject arbitrary web script or HTML via the id parameter.
How severe is CVE-2007-3131?
CVE-2007-3131 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3131?
Check the references section above for vendor advisories and patch information. Affected products include: Public Warehouse Light Blog.