in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information.
References
Link | Resource |
---|---|
https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4 | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925 | Exploit Third Party Advisory |
https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4 | Patch Third Party Advisory |
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4 - Patch, Third Party Advisory | |
References | () https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925 - Exploit, Third Party Advisory |
Information
Published : 2021-04-12 14:15
Updated : 2024-11-21 05:55
NVD link : CVE-2021-25925
Mitre link : CVE-2021-25925
CVE.ORG link : CVE-2021-25925
JSON object : View
Products Affected
sickrage
- sickrage
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')