Kentico CMS suffers from a XSS vulnerability when parsing user input to the 'userContextMenu_parameter' parameter via POST method in '/examples/webparts/membership/users-viewer.aspx'. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session.
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5015.php
31 May, 2011
Subscribe to:
Posts (Atom)