Vulnerability Description
Cross-site scripting (XSS) vulnerability in plugin/comment.inc.php in PukiWiki Plus! 1.4.7plus-u2-i18n and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pukiwiki | Pukiwiki Plus\! | <= 1.47 |
Related Weaknesses (CWE)
References
- http://jvn.jp/en/jp/JVN76515037/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2011-000107Patch
- http://pukiwiki.cafelounge.net/plus/?%E9%96%8B%E7%99%BA%E6%97%A5%E8%A8%98%2F2011Patch
- http://jvn.jp/en/jp/JVN76515037/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2011-000107Patch
- http://pukiwiki.cafelounge.net/plus/?%E9%96%8B%E7%99%BA%E6%97%A5%E8%A8%98%2F2011Patch
FAQ
What is CVE-2011-3990?
CVE-2011-3990 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Cross-site scripting (XSS) vulnerability in plugin/comment.inc.php in PukiWiki Plus! 1.4.7plus-u2-i18n and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vector...
How severe is CVE-2011-3990?
CVE-2011-3990 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3990?
Check the references section above for vendor advisories and patch information. Affected products include: Pukiwiki Pukiwiki Plus\!.