In TinyWebGallery v2.4, an XSS vulnerability is located in the `mkname`, `mkitem`, and `item` parameters of the `Add/Create` module. Remote attackers with low-privilege user accounts for backend access are able to inject malicious script codes into the `TWG Explorer` item listing. The request method to inject is POST and the attack vector is located on the application-side of the service. The injection point is the add/create input field and the execution point occurs in the item listing after the add or create.
References
Link | Resource |
---|---|
https://www.vulnerability-lab.com/get_content.php?id=1997 | Issue Tracking Third Party Advisory |
https://www.vulnerability-lab.com/get_content.php?id=1997 | Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 03:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.vulnerability-lab.com/get_content.php?id=1997 - Issue Tracking, Third Party Advisory |
Information
Published : 2017-11-06 22:29
Updated : 2024-11-21 03:16
NVD link : CVE-2017-16635
Mitre link : CVE-2017-16635
CVE.ORG link : CVE-2017-16635
JSON object : View
Products Affected
tinywebgallery
- tinywebgallery
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')