In TinyWebGallery v2.4, an XSS vulnerability is located in the `mkname`, `mkitem`, and `item` parameters of the `Add/Create` module. Remote attackers with low-privilege user accounts for backend access are able to inject malicious script codes into the `TWG Explorer` item listing. The request method to inject is POST and the attack vector is located on the application-side of the service. The injection point is the add/create input field and the execution point occurs in the item listing after the add or create.
References
Link | Resource |
---|---|
https://www.vulnerability-lab.com/get_content.php?id=1997 | Issue Tracking Third Party Advisory |
Configurations
Information
Published : 2017-11-06 14:29
Updated : 2017-11-29 06:56
NVD link : CVE-2017-16635
Mitre link : CVE-2017-16635
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
tinywebgallery
- tinywebgallery