Lucene search

K
exploitdbAndrew HortonEDB-ID:33344
HistoryNov 10, 2009 - 12:00 a.m.

CuteNews 1.4.6 - 'index.php' Cross-Site Request Forgery (New User Creation)

2009-11-1000:00:00
Andrew Horton
www.exploit-db.com
23

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/36971/info
    
CuteNews and UTF-8 CuteNews are prone to multiple vulnerabilities, including cross-site scripting, HTML-injection, information-disclosure, arbitrary-script-injection, and security-bypass issues.
    
Note that exploits for some of the issues may require administrator privilege.
    
Successful exploits may allow attackers to:
- obtain sensitive information
- gain unauthorized access to the affected application
- run arbitrary script code in the browser of an unsuspecting user in the context of the affected site
- hijack user sessions
- execute arbitrary commands in the context of the webserver process
    
A successful attack will compromise the application and may aid in further attacks. 

http://www.example.com/test/cutenews/index.php?mod=addnews&action=addnews

AI Score

7.4

Confidence

Low