CVE-2020-36654

A vulnerability classified as problematic has been found in GENI Portal. This affects the function no_invocation_id_error of the file portal/www/portal/sliceresource.php. The manipulation of the argument invocation_id/invocation_user leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 39a96fb4b822bd3497442a96135de498d4a81337. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218475.
References
Link Resource
https://github.com/GENI-NSF/geni-portal/commit/39a96fb4b822bd3497442a96135de498d4a81337 Patch Third Party Advisory
https://github.com/GENI-NSF/geni-portal/pull/1824 Patch Third Party Advisory
https://vuldb.com/?ctiid.218475 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.218475 Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:geni:geni-portal:*:*:*:*:*:*:*:*

Information

Published : 2023-01-18 00:15

Updated : 2023-01-25 11:25


NVD link : CVE-2020-36654

Mitre link : CVE-2020-36654


JSON object : View

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Advertisement

dedicated server usa

Products Affected

geni

  • geni-portal