Rapid7 Vulnerability & Exploit Database

Lyris ListManager 'doemailpassword.tml' Cross-Site Scripting

Back to Search

Lyris ListManager 'doemailpassword.tml' Cross-Site Scripting

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
03/20/2008
Created
07/25/2018
Added
03/20/2008
Modified
07/31/2012

Description

Some versions of Lyris ListManager do not properly filter user input when data is POSTed to /doemailpassword.tml from the /emailpassword.tml page. As a result, a remote attacker can launch a cross-site scripting attack against another user.

This vulnerability appears to be undocumented but has been fixed at some point between versions 8.8a and 9.2c. Lyris did not provide fix information.

Solution(s)

  • listmanager-upgrade-9-2-c

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;