Multiple stored XSS vulnerabilities in IrisNext Edition 9.5.16, which allows an authenticated (or compromised) user to inject malicious JavaScript in folder/file name within the application in order to grab other users’ sessions or execute malicious code in their browsers (1-click RCE).
References
Link | Resource |
---|---|
https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2021-27930.pdf | Exploit Third Party Advisory |
https://varsnext.iriscorporate.com/history.html | Product |
Configurations
Information
Published : 2021-07-06 05:15
Updated : 2021-07-09 08:37
NVD link : CVE-2021-27930
Mitre link : CVE-2021-27930
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
irislink
- irisnext