Summary
This host is running HESK and is prone to multiple cross-site scripting vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary HTML and script code in a user's browser session in context of affected website.
Impact Level: Application
Solution
Upgrade to HESK version 2.3 or later.
For updates refer to http://www.hesk.com/
Insight
The flaws are due to improper validation of
- input passed via the 'hesk_settings[tmp_title]' and 'hesklang[ENCODING]' parameters to '/inc/header.inc.php'.
- input passed via 'hesklang[attempt]' parameter to various files in '/inc/' directory.
- input appended to the URL after '/language/en/text.php', before being returned to the user.
Affected
HESK version 2.2 and prior.
References
Severity
Classification
-
CVE CVE-2011-5287 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities