A vulnerability classified as problematic has been found in PHPList 3.2.6. This affects an unknown part of the file /lists/admin/. The manipulation of the argument page with the input send\'\";><script>alert(8)</script> leads to cross site scripting (Reflected). It is possible to initiate the attack remotely. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2017/Mar/46 | Exploit Mailing List Third Party Advisory |
https://vuldb.com/?id.98919 | Third Party Advisory |
http://seclists.org/fulldisclosure/2017/Mar/46 | Exploit Mailing List Third Party Advisory |
https://vuldb.com/?id.98919 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2017/Mar/46 - Exploit, Mailing List, Third Party Advisory | |
References | () https://vuldb.com/?id.98919 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 4.3 |
Information
Published : 2022-06-10 10:15
Updated : 2024-11-21 03:22
NVD link : CVE-2017-20033
Mitre link : CVE-2017-20033
CVE.ORG link : CVE-2017-20033
JSON object : View
Products Affected
phplist
- phplist