CVE-2021-38138

OneNav beta 0.9.12 allows XSS via the Add Link feature. NOTE: the vendor's position is that there intentionally is not any XSS protection at present, because the attack risk is largely limited to a compromised account; however, XSS protection is planned for a future release.
Configurations

Configuration 1 (hide)

cpe:2.3:a:onenav:onenav:0.9.12:*:*:*:*:*:*:*

History

21 Nov 2024, 06:16

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/163753/OneNav-Beta-0.9.12-Cross-Site-Scripting.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/163753/OneNav-Beta-0.9.12-Cross-Site-Scripting.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/helloxz/onenav/issues/26 - Exploit, Third Party Advisory () https://github.com/helloxz/onenav/issues/26 - Exploit, Third Party Advisory
References () https://github.com/helloxz/onenav/releases - Third Party Advisory () https://github.com/helloxz/onenav/releases - Third Party Advisory

Information

Published : 2021-08-05 16:15

Updated : 2024-11-21 06:16


NVD link : CVE-2021-38138

Mitre link : CVE-2021-38138

CVE.ORG link : CVE-2021-38138


JSON object : View

Products Affected

onenav

  • onenav
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')