OpenSIS Community Edition version 8.0 is affected by a cross-site scripting (XSS) vulnerability in the TakeAttendance.php via the cp_id_miss_attn parameter.
References
Link | Resource |
---|---|
https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md | Exploit Third Party Advisory |
https://github.com/OS4ED/openSIS-Classic | Product Third Party Advisory |
https://www.youtube.com/watch?v=aPKPUDmmYpc | Exploit Third Party Advisory |
https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md | Exploit Third Party Advisory |
https://github.com/OS4ED/openSIS-Classic | Product Third Party Advisory |
https://www.youtube.com/watch?v=aPKPUDmmYpc | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md - Exploit, Third Party Advisory | |
References | () https://github.com/OS4ED/openSIS-Classic - Product, Third Party Advisory | |
References | () https://www.youtube.com/watch?v=aPKPUDmmYpc - Exploit, Third Party Advisory |
Information
Published : 2021-09-24 16:15
Updated : 2024-11-21 06:23
NVD link : CVE-2021-40310
Mitre link : CVE-2021-40310
CVE.ORG link : CVE-2021-40310
JSON object : View
Products Affected
os4ed
- opensis
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')