QuickBox Pro v2.4.8 contains a cross-site scripting (XSS) vulnerability at "adminuseredit.php?usertoedit=XSS", as the user supplied input for the value of this parameter is not properly sanitized.
References
Link | Resource |
---|---|
https://websec.nl/blog/61b2b37a43a1155c848f3b08/developing%20a%20remote%20code%20execution%20exploit%20for%20a%20popular%20media%20box | Exploit Third Party Advisory |
https://websec.nl/blog/61b2b37a43a1155c848f3b08/developing%20a%20remote%20code%20execution%20exploit%20for%20a%20popular%20media%20box | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://websec.nl/blog/61b2b37a43a1155c848f3b08/developing%20a%20remote%20code%20execution%20exploit%20for%20a%20popular%20media%20box - Exploit, Third Party Advisory |
Information
Published : 2022-02-07 22:15
Updated : 2024-11-21 06:32
NVD link : CVE-2021-45281
Mitre link : CVE-2021-45281
CVE.ORG link : CVE-2021-45281
JSON object : View
Products Affected
quickbox
- quickbox
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')