GUnet Open eClass (aka openeclass) before 3.12.2 allows XSS via the modules/auth/formuser.php auth parameter.
References
Link | Resource |
---|---|
https://docs.openeclass.org/el/current#%CE%AD%CE%BA%CE%B4%CE%BF%CF%83%CE%B7_3122 | Release Notes Third Party Advisory |
https://emaragkos.gr/cve-2021-44266/ | Third Party Advisory |
https://hg.gunet.gr/openeclass/rev/e0ed11f5768d | Exploit Vendor Advisory |
https://docs.openeclass.org/el/current#%CE%AD%CE%BA%CE%B4%CE%BF%CF%83%CE%B7_3122 | Release Notes Third Party Advisory |
https://emaragkos.gr/cve-2021-44266/ | Third Party Advisory |
https://hg.gunet.gr/openeclass/rev/e0ed11f5768d | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 06:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.openeclass.org/el/current#%CE%AD%CE%BA%CE%B4%CE%BF%CF%83%CE%B7_3122 - Release Notes, Third Party Advisory | |
References | () https://emaragkos.gr/cve-2021-44266/ - Third Party Advisory | |
References | () https://hg.gunet.gr/openeclass/rev/e0ed11f5768d - Exploit, Vendor Advisory |
Information
Published : 2022-06-11 15:15
Updated : 2024-11-21 06:30
NVD link : CVE-2021-44266
Mitre link : CVE-2021-44266
CVE.ORG link : CVE-2021-44266
JSON object : View
Products Affected
gunet
- open_eclass_platform
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')