FKIE_CVE-2013-5320
Vulnerability from fkie_nvd - Published: 2013-08-20 14:55 - Updated: 2026-04-29 01:13
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Forums/EditPost.aspx in mojoPortal before 2.3.9.8 allows remote attackers to inject arbitrary web script or HTML via the txtSubject parameter.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC0798D-E8DD-4343-B0F2-F339E2955BF9",
"versionEndIncluding": "2.3.9.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E59C176F-D536-4810-A355-52DF391B3952",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "968DE841-0BFC-4AEF-80CE-93BE0EBBEA3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "89619B01-0E71-4BBE-8CFD-8CF3F3214528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6AF073-AE44-4C2D-B4A5-38AB62B1A284",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A399E2DF-C72A-4971-99A5-927227637B9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "403D4511-8936-499B-9140-FC4E909BED11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "31413CC1-0CE7-42D4-B663-0212DD3E13BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7D0DC30B-7E08-4D0F-BA05-53B9CE0C1E08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F1FCBFD0-FF17-453F-A580-9384CDA71386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8841C42A-A547-40C2-B53C-B7D60229788E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E8509CAE-5AFA-42A2-8BDC-3A60E30974CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FAFAC7F-F11B-4C88-8592-EC09735082FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4A282F26-EACD-49AB-B105-C85108D131B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E04A7D4B-1983-4161-BC1F-CBF1BE573278",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "53AF046B-781A-4ADA-AD54-2C39E107B340",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEF6265-F3B8-4A82-9A01-81A762FBA6B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5A0CE2D5-25D7-4E9A-95EF-CC48FE3ADC6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1E953FBF-441E-49ED-94F6-688A13479416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F4EED09D-34E7-4A3B-BA03-C614A2C70E52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "912A2719-C5F9-4FA5-B269-907F55114442",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2128BA9A-A23A-432C-9C5A-B684F119C400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "78DF57FD-EF83-4BE3-9DC4-BA52B7D3417A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FCFE3632-5E17-49A6-B4A2-D446146425B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "038DDB13-CA10-40ED-8A1C-BCDC21172478",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "04E35D3B-D0A5-49A0-B133-D55932411CE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6F32F9F6-1B5B-45A8-B7FC-DA27A29BD982",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CDDE77F8-7C3F-4EA1-BCE3-0C3365632E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD63DC8-26B6-49FB-94F2-E881471949F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "07499CF0-A5EA-497A-B95F-5D019AD162E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "981A020A-6B07-457B-A308-3136E1DE7007",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9A8E68E4-B89C-4162-8B68-E5666B670F1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C45590B-C69F-452D-8F87-47D3AD8252F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CD357348-E0AE-40BF-9DA0-F26463B6741F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D0462C81-8CA8-4953-B5B6-EDB2A0EAAD5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "837CB0AC-2A72-4C09-B00D-D673404AA39D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CD829F60-4C1A-49EA-9E2C-8F7FC0005E88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "472BFC3B-283C-4E5D-BC4D-7C03DD6F9AF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7AAE8C9F-ED1E-46DC-9592-D2AA912D9BC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sourcetreesolutions:mojoportal:2.3.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A0562C-F8EE-4F0A-A8CA-E779C240F454",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Forums/EditPost.aspx in mojoPortal before 2.3.9.8 allows remote attackers to inject arbitrary web script or HTML via the txtSubject parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de XSS en Forums/EditPost.aspx en mojoPortal anterior a 2.3.9.8, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarias a trav\u00e9s del par\u00e1metro \"txtSubject\"."
}
],
"id": "CVE-2013-5320",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2013-08-20T14:55:47.140",
"references": [
{
"source": "cve@mitre.org",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0200.html"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/95847"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.com/files/122608/MojoPortal-2.3.9.7-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54297"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/61520"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86058"
},
{
"source": "cve@mitre.org",
"url": "https://www.mojoportal.com/mojoportal-2398-released"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-07/0200.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/95847"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.com/files/122608/MojoPortal-2.3.9.7-Cross-Site-Scripting.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/54297"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/61520"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86058"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.mojoportal.com/mojoportal-2398-released"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…