### [CVE-2013-3535](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3535) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Multiple cross-site scripting (XSS) vulnerabilities in CMSLogik 1.2.0 and 1.2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) admin_email, (2) header_title, (3) site_title parameter to admin/settings; (4) recaptcha_private or (5) recaptcha_public parameter to admin/captcha_settings; (6) fb_appid, (7) fp_secret, (8) tw_consumer_key, or (9) tw_consumer_secret parameter to admin/social_settings; (10) slug parameter to admin/gallery/save_item_settings; or (11) item_link parameter to admin/edit_menu_item_ajax. NOTE: this issue might be resultant from CSRF. ### POC #### Reference - http://packetstormsecurity.com/files/121303/CMSLogik-1.2.1-Cross-Site-Scripting.html - http://packetstormsecurity.com/files/121303/CMSLogik-1.2.1-Cross-Site-Scripting.html - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5136.php - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5136.php #### Github No PoCs found on GitHub currently.