ID:6279 - Exploit for Cross-site scripting in GetSimple CMS - CVE-2014-1603

 
Main Vulnerability Database Exploits ID:6279 - Exploit for Cross-site scripting in GetSimple CMS - CVE-2014-1603

ID:6279 - Exploit for Cross-site scripting in GetSimple CMS - CVE-2014-1603

Published: June 17, 2021


Vulnerability identifier: #VU41672
Vulnerability risk: Low
CVE-ID: CVE-2014-1603
CWE-ID: CWE-79
Exploitation vector: Remote access
Vulnerable software:
GetSimple CMS

Link to public exploit:


Vulnerability description

Vulnerability allows a remote attacker to perform Cross-site scripting attacks.

An input validation error exists in GetSimple CMS 3.3.1 when processing the (1) param parameter to admin/load.php or (2) user, (3) email, or (4) name parameter in a Save Settings action to admin/settings.php. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.