Multiple cross-site scripting (XSS) vulnerabilities in CutePHP CuteNews 1.4.6 and UTF-8 CuteNews before 8b allow remote attackers to inject arbitrary web script or HTML via (1) the result parameter to register.php; (2) the user parameter to search.php; the (3) cat_msg, (4) source_msg, (5) postponed_selected, (6) unapproved_selected, and (7) news_per_page parameters in a list action to the editnews module of index.php; and (8) the link tag in news comments. NOTE: some of the vulnerabilities require register_globals to be enabled and/or magic_quotes_gpc to be disabled.
www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt
www.securityfocus.com/archive/1/507782/100/0/threaded
www.securityfocus.com/bid/36971
exchange.xforce.ibmcloud.com/vulnerabilities/54221
exchange.xforce.ibmcloud.com/vulnerabilities/54222
exchange.xforce.ibmcloud.com/vulnerabilities/54223
exchange.xforce.ibmcloud.com/vulnerabilities/54224
exchange.xforce.ibmcloud.com/vulnerabilities/54237