Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in u5CMS before 3.9.4 allow remote attackers to inject arbitrary web script or HTML via the (1) c, (2) i, (3) l, or (4) p parameter to index.php; the (5) a or (6) b parameter to u5admin/cookie.php; the name parameter to (7) copy.php or (8) delete.php in u5admin/; the (9) f or (10) typ parameter to u5admin/deletefile.php; the (11) n parameter to u5admin/done.php; the (12) c parameter to u5admin/editor.php; the (13) uri parameter to u5admin/meta2.php; the (14) n parameter to u5admin/notdone.php; the (15) newname parameter to u5admin/rename2.php; the (16) l parameter to u5admin/sendfile.php; the (17) s parameter to u5admin/characters.php; the (18) page parameter to u5admin/savepage.php; or the (19) name parameter to u5admin/new2.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Yuba | U5Cms | <= 3.9.3 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/130292/u5CMS-3.9.3-Cross-Site-Scripting.htmExploit
- http://www.exploit-db.com/exploits/36029Exploit
- http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5223.phpExploit
- http://packetstormsecurity.com/files/130292/u5CMS-3.9.3-Cross-Site-Scripting.htmExploit
- http://www.exploit-db.com/exploits/36029Exploit
- http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5223.phpExploit
FAQ
What is CVE-2015-1575?
CVE-2015-1575 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Multiple cross-site scripting (XSS) vulnerabilities in u5CMS before 3.9.4 allow remote attackers to inject arbitrary web script or HTML via the (1) c, (2) i, (3) l, or (4) p parameter to index.php; th...
How severe is CVE-2015-1575?
CVE-2015-1575 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-1575?
Check the references section above for vendor advisories and patch information. Affected products include: Yuba U5Cms.