RosarioSIS 6.7.2 is vulnerable to XSS, caused by improper validation of user-supplied input by the PrintSchedules.php script. A remote attacker could exploit this vulnerability using the include_inactive parameter in a crafted URL.
References
Link | Resource |
---|---|
https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md | Release Notes Third Party Advisory |
https://gitlab.com/francoisjacquet/rosariosis/-/issues/291 | Broken Link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/184944 | Third Party Advisory VDB Entry |
https://gitlab.com/francoisjacquet/rosariosis/-/commit/89ae9de732024e3a2e99262aa98b400a1aa6975a | Patch Third Party Advisory |
https://gitlab.com/francoisjacquet/rosariosis/-/tags/v6.8-beta | Third Party Advisory |
Configurations
Information
Published : 2020-07-15 13:15
Updated : 2020-07-22 10:00
NVD link : CVE-2020-15718
Mitre link : CVE-2020-15718
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
rosariosis
- rosariosis