CVE-2021-4291

A vulnerability was found in OpenMRS Admin UI Module up to 1.5.x. It has been declared as problematic. This vulnerability affects unknown code of the file omod/src/main/webapp/pages/metadata/locations/location.gsp. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is a7eefb5f69f6c50a3bffcb138bb8ea57cb41a9b6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216916.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:openmrs:admin_ui_module:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:37

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.1
v2 : unknown
v3 : 3.5
References () https://github.com/openmrs/openmrs-module-adminui/commit/a7eefb5f69f6c50a3bffcb138bb8ea57cb41a9b6 - Patch, Third Party Advisory () https://github.com/openmrs/openmrs-module-adminui/commit/a7eefb5f69f6c50a3bffcb138bb8ea57cb41a9b6 - Patch, Third Party Advisory
References () https://github.com/openmrs/openmrs-module-adminui/pull/61 - Patch, Third Party Advisory () https://github.com/openmrs/openmrs-module-adminui/pull/61 - Patch, Third Party Advisory
References () https://github.com/openmrs/openmrs-module-adminui/releases/tag/1.6.0 - Release Notes, Third Party Advisory () https://github.com/openmrs/openmrs-module-adminui/releases/tag/1.6.0 - Release Notes, Third Party Advisory
References () https://vuldb.com/?ctiid.216916 - Permissions Required, Third Party Advisory () https://vuldb.com/?ctiid.216916 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.216916 - Permissions Required, Third Party Advisory () https://vuldb.com/?id.216916 - Permissions Required, Third Party Advisory

Information

Published : 2022-12-27 23:15

Updated : 2024-11-21 06:37


NVD link : CVE-2021-4291

Mitre link : CVE-2021-4291

CVE.ORG link : CVE-2021-4291


JSON object : View

Products Affected

openmrs

  • admin_ui_module
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')