Vulnerability Description
The sanitize_string function in Zenphoto before 1.4.9 does not properly sanitize HTML tags, which allows remote attackers to perform a cross-site scripting (XSS) attack by wrapping a payload in "<<script></script>script>payload<script></script></script>", or in an image tag, with the payload as the onerror event.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zenphoto | Zenphoto | < 1.4.9 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2015/07/18/3ExploitMailing ListThird Party Advisory
- http://www.zenphoto.org/news/zenphoto-1.4.9Release Notes
- https://software-talk.org/blog/2015/07/second-order-sql-injection-reflected-xss-Broken Link
- http://www.openwall.com/lists/oss-security/2015/07/18/3ExploitMailing ListThird Party Advisory
- http://www.zenphoto.org/news/zenphoto-1.4.9Release Notes
- https://software-talk.org/blog/2015/07/second-order-sql-injection-reflected-xss-Broken Link
FAQ
What is CVE-2015-5593?
CVE-2015-5593 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The sanitize_string function in Zenphoto before 1.4.9 does not properly sanitize HTML tags, which allows remote attackers to perform a cross-site scripting (XSS) attack by wrapping a payload in "<<scr...
How severe is CVE-2015-5593?
CVE-2015-5593 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5593?
Check the references section above for vendor advisories and patch information. Affected products include: Zenphoto Zenphoto.