{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2016-15032","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-05-31T16:49:59.460Z","datePublished":"2023-06-01T22:31:04.601Z","dateUpdated":"2024-08-06T03:47:34.816Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T11:25:18.339Z"},"title":"mback2k mh_httpbl Extension class.tx_mhhttpbl.php stopOutput cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"mback2k","product":"mh_httpbl Extension","versions":[{"version":"1.1.0","status":"affected"},{"version":"1.1.1","status":"affected"},{"version":"1.1.2","status":"affected"},{"version":"1.1.3","status":"affected"},{"version":"1.1.4","status":"affected"},{"version":"1.1.5","status":"affected"},{"version":"1.1.6","status":"affected"},{"version":"1.1.7","status":"affected"}]}],"descriptions":[{"lang":"en","value":"** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in mback2k mh_httpbl Extension up to 1.1.7 on TYPO3. This affects the function stopOutput of the file class.tx_mhhttpbl.php. The manipulation of the argument $_SERVER['REMOTE_ADDR'] leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.1.8 is able to address this issue. The patch is named a754bf306a433a8c18b55e25595593e8f19b9463. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230391. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."},{"lang":"de","value":"Es wurde eine Schwachstelle in mback2k mh_httpbl Extension bis 1.1.7 für TYPO3 entdeckt. Sie wurde als problematisch eingestuft. Hiervon betroffen ist die Funktion stopOutput der Datei class.tx_mhhttpbl.php. Durch das Manipulieren des Arguments $_SERVER['REMOTE_ADDR'] mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Ein Aktualisieren auf die Version 1.1.8 vermag dieses Problem zu lösen. Der Patch wird als a754bf306a433a8c18b55e25595593e8f19b9463 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2016-05-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2016-05-26T00:00:00.000Z","lang":"en","value":"Countermeasure disclosed"},{"time":"2023-05-31T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-05-31T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-06-25T10:47:38.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.230391","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.230391","tags":["signature","permissions-required"]},{"url":"https://github.com/mback2k/mh_httpbl/commit/a754bf306a433a8c18b55e25595593e8f19b9463","tags":["patch"]},{"url":"https://github.com/mback2k/mh_httpbl/releases/tag/mh_httpbl_1.1.8_security","tags":["patch"]}],"tags":["unsupported-when-assigned"]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T03:47:34.816Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.230391","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.230391","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/mback2k/mh_httpbl/commit/a754bf306a433a8c18b55e25595593e8f19b9463","tags":["patch","x_transferred"]},{"url":"https://github.com/mback2k/mh_httpbl/releases/tag/mh_httpbl_1.1.8_security","tags":["patch","x_transferred"]}]}]}}