CPANSA-Mojolicious-2011-01: Mojolicious vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2011-03-10T00:00:00 Engine CSAF Perl Toolkit 0.25
Current release date 2011-03-10T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score Severity High
Original language Language en
Also referred to

Vulnerability Description

Mojolicious is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by link_to helper. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

Vulnerabilities

CVE-2011-1841

Vulnerability Description

Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Weakness CWE-79 : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Known affected
Product Score
Mojolicious less than 1.12
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
2.0 AV:N/AC:M/Au:N/C:N/I:P/A:N 4.3 Medium
Fixed

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Thu Mar 10 00:00:00 2011 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/