A Cross Site Scripting (XSS) vulnerability exists in RosarioSIS before 7.6.1 via the xss_clean function in classes/Security.php, which allows remote malicious users to inject arbitrary JavaScript or HTML. An example of affected components are all Markdown input fields.
References
Link | Resource |
---|---|
https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md#changes-in-761 | Release Notes Third Party Advisory |
https://gitlab.com/francoisjacquet/rosariosis/-/commit/0f5d1f1d193bc6b711d1644f172579d498ec1636 | Patch Third Party Advisory |
https://gitlab.com/francoisjacquet/rosariosis/-/issues/307 | Exploit Issue Tracking Third Party Advisory |
https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md#changes-in-761 | Release Notes Third Party Advisory |
https://gitlab.com/francoisjacquet/rosariosis/-/commit/0f5d1f1d193bc6b711d1644f172579d498ec1636 | Patch Third Party Advisory |
https://gitlab.com/francoisjacquet/rosariosis/-/issues/307 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 06:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md#changes-in-761 - Release Notes, Third Party Advisory | |
References | () https://gitlab.com/francoisjacquet/rosariosis/-/commit/0f5d1f1d193bc6b711d1644f172579d498ec1636 - Patch, Third Party Advisory | |
References | () https://gitlab.com/francoisjacquet/rosariosis/-/issues/307 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2022-02-24 15:15
Updated : 2024-11-21 06:31
NVD link : CVE-2021-44565
Mitre link : CVE-2021-44565
CVE.ORG link : CVE-2021-44565
JSON object : View
Products Affected
rosariosis
- rosariosis
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')