i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__MONITORING__CONFIG__ADDRESS, or SM2__C__MONITORING__CONFIG__ADDRESS.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/162815/i-doit-1.15.2-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
https://www.i-doit.org/news/ | Release Notes Vendor Advisory |
https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-056 | Exploit Vendor Advisory |
http://packetstormsecurity.com/files/162815/i-doit-1.15.2-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
https://www.i-doit.org/news/ | Release Notes Vendor Advisory |
https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-056 | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 06:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/162815/i-doit-1.15.2-Cross-Site-Scripting.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.i-doit.org/news/ - Release Notes, Vendor Advisory | |
References | () https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-056 - Exploit, Vendor Advisory |
Information
Published : 2021-02-27 05:15
Updated : 2024-11-21 06:21
NVD link : CVE-2021-3151
Mitre link : CVE-2021-3151
CVE.ORG link : CVE-2021-3151
JSON object : View
Products Affected
i-doit
- i-doit
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')