Vulnerability Details : CVE-2014-0341
Multiple cross-site scripting (XSS) vulnerabilities in PivotX before 2.3.9 allow remote authenticated users to inject arbitrary web script or HTML via the title field to (1) templates_internal/pages.tpl, (2) templates_internal/home.tpl, or (3) templates_internal/entries.tpl; (4) an event field to objects.php; or the (5) email or (6) nickname field to pages.php, related to templates_internal/users.tpl.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2014-0341
Probability of exploitation activity in the next 30 days: 0.17%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 53 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-0341
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:P/A:N |
6.8
|
2.9
|
NIST |
CWE ids for CVE-2014-0341
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-0341
-
http://www.securityfocus.com/bid/66800
PivotX CVE-2014-0341 Multiple Cross Site Scripting Vulnerabilities
-
http://pivotx.net/page/security
Security - PivotXVendor Advisory
-
http://blog.pivotx.net/archive/2014/03/03/pivotx-239-released
PivotX 2.3.9 released. - PivotX Blog
-
http://sourceforge.net/p/pivot-weblog/code/4345/
PivotX / Code / Commit [r4345]Exploit;Patch
-
http://www.kb.cert.org/vuls/id/901156
VU#901156 - PivotX 2.3.8 contains multiple vulnerabilitiesUS Government Resource
-
http://sourceforge.net/p/pivot-weblog/code/4349/
PivotX / Code / Commit [r4349]Exploit;Patch
Products affected by CVE-2014-0341
- cpe:2.3:a:pivotx:pivotx:*:*:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.2.0:b1:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.2.0:rc:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.2.0:b2:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:pivotx:pivotx:2.3.0:*:*:*:*:*:*:*