Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Bitweaver 2.8.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the path info to (1) stats/index.php or (2) newsletters/edition.php or the (3) username parameter to users/remind_password.php, (4) days parameter to stats/index.php, (5) login parameter to users/register.php, or (6) highlight parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bitweaver | Bitweaver | <= 2.8.1 |
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/22216ExploitThird Party AdvisoryVDB Entry
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/twsl2012-016-mulThird Party Advisory
- https://www.exploit-db.com/exploits/22216ExploitThird Party AdvisoryVDB Entry
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/twsl2012-016-mulThird Party Advisory
FAQ
What is CVE-2012-5193?
CVE-2012-5193 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Multiple cross-site scripting (XSS) vulnerabilities in Bitweaver 2.8.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the path info to (1) stats/index.php or (2) newslet...
How severe is CVE-2012-5193?
CVE-2012-5193 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-5193?
Check the references section above for vendor advisories and patch information. Affected products include: Bitweaver Bitweaver.