CVE-2018-10726

A stored XSS vulnerability was found in Datenstrom Yellow 0.7.3 via an "Edit page" action. NOTE: the vendor disputes the relevance of this report because an installation accessible to untrusted users is supposed to have parserSafeMode=1 in system/config/config.ini to prevent XSS
References
Link Resource
https://github.com/datenstrom/yellow/issues/321 Exploit Third Party Advisory
https://github.com/datenstrom/yellow/issues/321 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:datenstrom:yellow:0.7.3:*:*:*:*:*:*:*

History

21 Nov 2024, 03:41

Type Values Removed Values Added
References () https://github.com/datenstrom/yellow/issues/321 - Exploit, Third Party Advisory () https://github.com/datenstrom/yellow/issues/321 - Exploit, Third Party Advisory

07 Nov 2023, 02:51

Type Values Removed Values Added
Summary ** DISPUTED ** A stored XSS vulnerability was found in Datenstrom Yellow 0.7.3 via an "Edit page" action. NOTE: the vendor disputes the relevance of this report because an installation accessible to untrusted users is supposed to have parserSafeMode=1 in system/config/config.ini to prevent XSS. A stored XSS vulnerability was found in Datenstrom Yellow 0.7.3 via an "Edit page" action. NOTE: the vendor disputes the relevance of this report because an installation accessible to untrusted users is supposed to have parserSafeMode=1 in system/config/config.ini to prevent XSS

Information

Published : 2018-05-04 15:29

Updated : 2024-11-21 03:41


NVD link : CVE-2018-10726

Mitre link : CVE-2018-10726

CVE.ORG link : CVE-2018-10726


JSON object : View

Products Affected

datenstrom

  • yellow
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')