A Cross-site scripting (XSS) vulnerability exists in the comment section in ZrLog 2.1.3, which allows remote attackers to inject arbitrary web script and stolen administrator cookies via the nickname parameter and gain access to the admin panel.
References
Link | Resource |
---|---|
https://gist.github.com/T-pod/d9405dbd61243990d65d55c5df0fcbe6 | Patch Third Party Advisory |
https://github.com/94fzb/zrlog/issues/56 | Patch Third Party Advisory |
https://github.com/94fzb/zrlog/commit/b921c1ae03b8290f438657803eee05226755c941 | Patch Third Party Advisory |
Configurations
Information
Published : 2021-06-15 13:15
Updated : 2021-06-21 18:05
NVD link : CVE-2020-21316
Mitre link : CVE-2020-21316
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
zrlog
- zrlog