A vulnerability has been found in aerouk imageserve and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument REQUEST_URI leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 2ac3cd4f90b4df66874fab171376ca26868604c4. It is recommended to apply a patch to fix this issue. The identifier VDB-217057 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/aerouk/imageserve/commit/2ac3cd4f90b4df66874fab171376ca26868604c4 | Patch Third Party Advisory |
https://github.com/aerouk/imageserve/pull/27 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.217057 | Third Party Advisory |
https://vuldb.com/?id.217057 | Third Party Advisory |
https://github.com/aerouk/imageserve/commit/2ac3cd4f90b4df66874fab171376ca26868604c4 | Patch Third Party Advisory |
https://github.com/aerouk/imageserve/pull/27 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.217057 | Third Party Advisory |
https://vuldb.com/?id.217057 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/aerouk/imageserve/commit/2ac3cd4f90b4df66874fab171376ca26868604c4 - Patch, Third Party Advisory | |
References | () https://github.com/aerouk/imageserve/pull/27 - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.217057 - Third Party Advisory | |
References | () https://vuldb.com/?id.217057 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 2.6 |
07 Nov 2023, 02:43
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 |
20 Oct 2023, 12:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
Summary | A vulnerability has been found in aerouk imageserve and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument REQUEST_URI leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 2ac3cd4f90b4df66874fab171376ca26868604c4. It is recommended to apply a patch to fix this issue. The identifier VDB-217057 was assigned to this vulnerability. |
Information
Published : 2022-12-30 12:15
Updated : 2024-11-21 03:22
NVD link : CVE-2017-20153
Mitre link : CVE-2017-20153
CVE.ORG link : CVE-2017-20153
JSON object : View
Products Affected
imageserve_project
- imageserve
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')