Plone spamProtect mailaddress Parameter XSS

This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.

Synopsis :

The remote web server contains a Python script that is affected by a
cross-site scripting vulnerability.

Description :

The version of Plone installed on the remote web server is affected
by a cross-site scripting vulnerability because it fails to properly
sanitize input to the 'mailaddress' parameter of the ''
script. An attacker may be able to leverage this to inject arbitrary
HTML and script code into a user's browser to be executed within the
security context of the affected site.

Note that the application is also reportedly affected by several
additional vulnerabilities. Some of the reported vulnerabilities
include but are not limited to arbitrary code execution, privilege
escalation, denial of service (DoS), open redirect, cross-site
scripting, as well as several additional flaws; however, Nessus has
not tested for the additional issues.

See also :

Solution :

Follow the instructions in the advisory to apply the hotfix.

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 67205 ()

Bugtraq ID: 60339

CVE ID: CVE-2013-4190

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now