Published:2008/10/20  Last Updated:2008/10/20

JVN#03300113
Blosxom vulnerable to cross-site scripting

Overview

Blosxom, a weblog system contains a cross-site scripting vulnerability.

Products Affected

  • Blosxom 2.1.1 and earlier

Description

Blosxom is an open source weblog system. Blosxom contains a cross-site scripting vulnerability.

Impact

An arbitrary script can be executed on the user's web browser.

Solution

Update the Software
Apply the latest udpate provided by the developer.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2008.10.20

Measures Conditions Severity
Access Required Routed - can be attacked over the Internet using packets
  • High
Authentication None - anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file
  • Medium
Exploit Complexity Low - little to no expertise and/or luck required to exploit (cross-site scripting)
  • High

Description of each analysis measures

Credit

Yoshinori Ohta of Business Architects Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2008-2236
JVN iPedia JVNDB-2008-000073

Update History