CVE-2016-15032

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2016-15032
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-15032.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-15032
Published
2023-06-02T00:15:09Z
Modified
2024-08-06T08:45:23.194660Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

* UNSUPPORTED WHEN ASSIGNED * A vulnerability classified as problematic has been found in mback2k mhhttpbl Extension up to 1.1.7 on TYPO3. This affects the function stopOutput of the file class.txmhhttpbl.php. The manipulation of the argument $SERVER['REMOTEADDR'] leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.1.8 is able to address this issue. The patch is named a754bf306a433a8c18b55e25595593e8f19b9463. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230391. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

References

Affected packages

Git / github.com/mback2k/mh_httpbl

Affected ranges

Type
GIT
Repo
https://github.com/mback2k/mh_httpbl
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

mh_httpbl_1.*

mh_httpbl_1.0.0
mh_httpbl_1.0.1
mh_httpbl_1.1.0
mh_httpbl_1.1.1
mh_httpbl_1.1.2
mh_httpbl_1.1.3
mh_httpbl_1.1.4
mh_httpbl_1.1.5
mh_httpbl_1.1.6
mh_httpbl_1.1.7