A vulnerability was found in OpenSeaMap online_chart 1.2. It has been classified as problematic. Affected is the function init of the file index.php. The manipulation of the argument mtext leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version staging is able to address this issue. The name of the patch is 8649157158f921590d650e2d2f4bdf0df1017e9d. It is recommended to upgrade the affected component. VDB-220218 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/OpenSeaMap/online_chart/commit/8649157158f921590d650e2d2f4bdf0df1017e9d | Patch |
https://vuldb.com/?id.220218 | Third Party Advisory |
https://vuldb.com/?ctiid.220218 | Permissions Required |
https://github.com/OpenSeaMap/online_chart/pull/70 | Patch |
https://github.com/OpenSeaMap/online_chart/releases/tag/staging | Patch |
Configurations
Information
Published : 2023-02-07 02:15
Updated : 2023-02-14 15:21
NVD link : CVE-2015-10074
Mitre link : CVE-2015-10074
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
openseamap
- online_chart