Kentico CMS suffers from a XSS vulnerability when parsing user input to the 'userContextMenu_parameter' parameter via POST method in '/examples/webparts/membership/users-viewer.aspx'. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session.
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5015.php
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment