Summary
This host is running GetSimple CMS and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Impact Level: Application
Solution
Upgrade to version 2.03 or later,
For updates refer to http://get-simple.info/download
Insight
The flaws are due to, input passed to various scripts via various parameters are not properly sanitized before being returned to the user.
Affected
GetSimple CMS version 2.01
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- AeroMail Cross Site Request Forgery, HTML Injection and Cross Site Scripting Vulnerabilities
- Apache Archiva Home Page Cross-Site Scripting vulnerability
- Apache Subversion Module Metadata Accessible
- Aardvark Topsites PHP 'index.php' Multiple Cross Site Scripting Vulnerabilities
- Apache ActiveMQ Persistent Cross-Site Scripting Vulnerability