CVE-2021-4312

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Th3-822 Rapidleech. This affects the function zip_go of the file classes/options/zip.php. The manipulation of the argument archive leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named 885a87ea4ee5e14fa95801eca255604fb2e138c6. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218295. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/Th3-822/rapidleech/commit/885a87ea4ee5e14fa95801eca255604fb2e138c6 Patch
https://vuldb.com/?ctiid.218295 Permissions Required Third Party Advisory
https://vuldb.com/?id.218295 Permissions Required Third Party Advisory
https://github.com/Th3-822/rapidleech/commit/885a87ea4ee5e14fa95801eca255604fb2e138c6 Patch
https://vuldb.com/?ctiid.218295 Permissions Required Third Party Advisory
https://vuldb.com/?id.218295 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:rapidleech:rapidleech:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:37

Type Values Removed Values Added
References () https://github.com/Th3-822/rapidleech/commit/885a87ea4ee5e14fa95801eca255604fb2e138c6 - Patch () https://github.com/Th3-822/rapidleech/commit/885a87ea4ee5e14fa95801eca255604fb2e138c6 - Patch
References () https://vuldb.com/?ctiid.218295 - Permissions Required, Third Party Advisory () https://vuldb.com/?ctiid.218295 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.218295 - Permissions Required, Third Party Advisory () https://vuldb.com/?id.218295 - Permissions Required, Third Party Advisory
CVSS v2 : 4.0
v3 : 6.1
v2 : 4.0
v3 : 3.5
Summary
  • (es) ** NO SOPORTADO CUANDO SE ASIGNÓ ** Se ha encontrado una vulnerabilidad en Th3-822 Rapidleech y se ha clasificado como problemática. Esto afecta a la función zip_go del archivo clases/opciones/zip.php. La manipulación del archivo de argumentos conduce a cross-site scripting. Es posible iniciar el ataque de forma remota. El parche se llama 885a87ea4ee5e14fa95801eca255604fb2e138c6. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-218295. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante.

07 Nov 2023, 03:40

Type Values Removed Values Added
Summary ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Th3-822 Rapidleech. This affects the function zip_go of the file classes/options/zip.php. The manipulation of the argument archive leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named 885a87ea4ee5e14fa95801eca255604fb2e138c6. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218295. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Th3-822 Rapidleech. This affects the function zip_go of the file classes/options/zip.php. The manipulation of the argument archive leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named 885a87ea4ee5e14fa95801eca255604fb2e138c6. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218295. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

04 Nov 2023, 02:55

Type Values Removed Values Added
CWE CWE-79

20 Oct 2023, 14:15

Type Values Removed Values Added
CWE CWE-79
Summary ** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Th3-822 Rapidleech. This affects the function zip_go of the file classes/options/zip.php. The manipulation of the argument archive leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 885a87ea4ee5e14fa95801eca255604fb2e138c6. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218295. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Th3-822 Rapidleech. This affects the function zip_go of the file classes/options/zip.php. The manipulation of the argument archive leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named 885a87ea4ee5e14fa95801eca255604fb2e138c6. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218295. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Information

Published : 2023-01-13 18:15

Updated : 2024-11-21 06:37


NVD link : CVE-2021-4312

Mitre link : CVE-2021-4312

CVE.ORG link : CVE-2021-4312


JSON object : View

Products Affected

rapidleech

  • rapidleech
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')