Vulnerability Description
The sanitize_string function in ZenPhoto before 1.4.9 utilized the html_entity_decode function after input sanitation, which might allow remote attackers to perform a cross-site scripting (XSS) via a crafted string.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zenphoto | Zenphoto | <= 1.4.8 |
Related Weaknesses (CWE)
References
- http://cve.killedkenny.io/cve/CVE-2015-5594Not Applicable
- http://www.openwall.com/lists/oss-security/2015/07/18/3ExploitMailing ListThird Party Advisory
- http://www.zenphoto.org/news/zenphoto-1.4.9Release NotesThird Party Advisory
- https://software-talk.org/blog/2015/07/second-order-sql-injection-reflected-xss-ExploitThird Party Advisory
- http://cve.killedkenny.io/cve/CVE-2015-5594Not Applicable
- http://www.openwall.com/lists/oss-security/2015/07/18/3ExploitMailing ListThird Party Advisory
- http://www.zenphoto.org/news/zenphoto-1.4.9Release NotesThird Party Advisory
- https://software-talk.org/blog/2015/07/second-order-sql-injection-reflected-xss-ExploitThird Party Advisory
FAQ
What is CVE-2015-5594?
CVE-2015-5594 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The sanitize_string function in ZenPhoto before 1.4.9 utilized the html_entity_decode function after input sanitation, which might allow remote attackers to perform a cross-site scripting (XSS) via a ...
How severe is CVE-2015-5594?
CVE-2015-5594 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5594?
Check the references section above for vendor advisories and patch information. Affected products include: Zenphoto Zenphoto.