Vulnerability Description
GeniXCMS before 1.1.0 allows remote attackers to cause a denial of service (account blockage) by leveraging the mishandling of certain username substring relationships, such as the admin<script> username versus the admin username, related to register.php, User.class.php, and Type.class.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Genixcms | Genixcms | <= 1.0.2 |
Related Weaknesses (CWE)
References
- https://github.com/semplon/GeniXCMS/issues/78ExploitThird Party Advisory
- https://github.com/semplon/GeniXCMS/releases/tag/v1.1.0Release NotesThird Party Advisory
- https://github.com/semplon/GeniXCMS/issues/78ExploitThird Party Advisory
- https://github.com/semplon/GeniXCMS/releases/tag/v1.1.0Release NotesThird Party Advisory
FAQ
What is CVE-2017-14231?
CVE-2017-14231 is a vulnerability with a CVSS score of 5.3 (MEDIUM). GeniXCMS before 1.1.0 allows remote attackers to cause a denial of service (account blockage) by leveraging the mishandling of certain username substring relationships, such as the admin<script> usern...
How severe is CVE-2017-14231?
CVE-2017-14231 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14231?
Check the references section above for vendor advisories and patch information. Affected products include: Genixcms Genixcms.