Files
CVEs-PoC/2012/CVE-2012-1019.md
2025-09-29 21:09:30 +02:00

19 lines
1.0 KiB
Markdown

### [CVE-2012-1019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1019)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
Multiple cross-site scripting (XSS) vulnerabilities in XWiki Enterprise 3.4 allow remote attackers to inject arbitrary web script or HTML via the (1) XWiki.XWikiComments_comment parameter to xwiki/bin/commentadd/Main/WebHome, (2) XWiki.XWikiUsers_0_company parameter when editing a user profile, or (3) projectVersion parameter to xwiki/bin/view/DownloadCode/DownloadFeedback. NOTE: some of these details are obtained from third party information.
### POC
#### Reference
- http://packetstormsecurity.org/files/109447/XWiki-Enterprise-3.4-Cross-Site-Scripting.html
- http://st2tea.blogspot.com/2012/02/xwiki-cross-site-scripting.html
#### Github
No PoCs found on GitHub currently.