![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.805592 |
Category: | Web application abuses |
Title: | SilverStripe CMS < 3.1.14 Multiple Vulnerabilities - Active Check |
Summary: | SilverStripe CMS is prone to multiple vulnerabilities. |
Description: | Summary: SilverStripe CMS is prone to multiple vulnerabilities. Vulnerability Insight: Multiple flaws exist due to: - insufficient validation of input passed via 'admin_username' and 'admin_password' POST parameter to the install.php script - the application not validating the 'returnURL' GET parameter upon submission to the /dev/build script Vulnerability Impact: Successful exploitation will allow remote attackers to create a specially crafted URL, that if clicked, would redirect a victim from the intended legitimate web site to an arbitrary web site of the attacker's choosing, and execute arbitrary HTML and script code in the context of an affected site. Affected Software/OS: SilverStripe CMS version 3.1.13 and probably prior. Solution: Update to version 3.1.14 or later. CVSS Score: 5.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-5063 Bugtraq: 20150609 SilverStripe CMS Unvalidated Redirect & XSS vulnerabilities (Google Search) http://www.securityfocus.com/archive/1/535716/100/0/threaded http://hyp3rlinx.altervista.org/advisories/AS-SILVERSTRIPE0607.txt http://packetstormsecurity.com/files/132223/SilverStripe-CMS-3.1.13-XSS-Open-Redirect.html Common Vulnerability Exposure (CVE) ID: CVE-2015-5062 BugTraq ID: 75419 http://www.securityfocus.com/bid/75419 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |