A vulnerability, which was classified as problematic, has been found in PHPList 3.2.6. This issue affects some unknown processing of the file /lists/admin/ of the component Subscribe. The manipulation leads to cross site scripting (Persistent). The attack may be initiated remotely. Upgrading to version 3.3.1 is able to address this issue. It is recommended to upgrade the affected component.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2017/Mar/46 | Exploit Mailing List Third Party Advisory |
https://vuldb.com/?id.98921 | Third Party Advisory |
http://seclists.org/fulldisclosure/2017/Mar/46 | Exploit Mailing List Third Party Advisory |
https://vuldb.com/?id.98921 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:22
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 3.5 |
References | () http://seclists.org/fulldisclosure/2017/Mar/46 - Exploit, Mailing List, Third Party Advisory | |
References | () https://vuldb.com/?id.98921 - Third Party Advisory |
Information
Published : 2022-06-10 10:15
Updated : 2024-11-21 03:22
NVD link : CVE-2017-20035
Mitre link : CVE-2017-20035
CVE.ORG link : CVE-2017-20035
JSON object : View
Products Affected
phplist
- phplist