An issue was discovered in Userscape HelpSpot before 4.7.2. A reflected cross-site scripting vulnerability exists in the "return" parameter of the "index.php?pg=moderated" endpoint. It executes when the return link is clicked.
References
Link | Resource |
---|---|
https://ruby.sh/helpspot-disclosure-20180206.txt | Exploit Third Party Advisory |
https://www.helpspot.com/releases | Vendor Advisory |
https://www.helpspot.com/releases/version-4-7-2 | Vendor Advisory |
https://ruby.sh/helpspot-disclosure-20180206.txt | Exploit Third Party Advisory |
https://www.helpspot.com/releases | Vendor Advisory |
https://www.helpspot.com/releases/version-4-7-2 | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://ruby.sh/helpspot-disclosure-20180206.txt - Exploit, Third Party Advisory | |
References | () https://www.helpspot.com/releases - Vendor Advisory | |
References | () https://www.helpspot.com/releases/version-4-7-2 - Vendor Advisory |
Information
Published : 2018-02-19 14:29
Updated : 2024-11-21 03:16
NVD link : CVE-2017-16755
Mitre link : CVE-2017-16755
CVE.ORG link : CVE-2017-16755
JSON object : View
Products Affected
userscape
- helpspot
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')