Multiple cross-site scripting (XSS) vulnerabilities in BarracudaDrive before 6.7 allow remote attackers to inject arbitrary web script or HTML via the (1) sForumName or (2) sDescription parameter to Forum/manage/ForumManager.lsp; (3) sHint, (4) sWord, or (5) nId parameter to Forum/manage/hangman.lsp; (6) user parameter to rtl/protected/admin/wizard/setuser.lsp; (7) name or (8) email parameter to feedback.lsp; (9) lname or (10) url parameter to private/manage/PageManager.lsp; (11) cmd parameter to fs; (12) newname, (13) description, (14) firstname, (15) lastname, or (16) id parameter to rtl/protected/mail/manage/list.lsp; or (17) PATH_INFO to fs/.
References
Link Resource
http://barracudadrive.com/readme.txt Release Notes Vendor Advisory
http://packetstormsecurity.com/files/125766 Exploit Third Party Advisory VDB Entry
http://secpod.org/advisories/SecPod_BarracudaDrive_Mult_XSS_Vuln.txt Broken Link
http://secpod.org/blog/?p=2158 Broken Link
http://secunia.com/advisories/57451 Not Applicable Third Party Advisory
http://www.securityfocus.com/bid/66269 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/91920 VDB Entry Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2014-03-25T14:00:00

Updated: 2017-08-28T12:57:01

Reserved: 2014-03-17T00:00:00


Link: CVE-2014-2526

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2014-03-25T18:21:48.263

Modified: 2021-05-27T16:42:16.077


Link: CVE-2014-2526

JSON object: View

cve-icon Redhat Information

No data.

CWE