CVE-2021-4291

A vulnerability was found in OpenMRS Admin UI Module up to 1.5.x. It has been declared as problematic. This vulnerability affects unknown code of the file omod/src/main/webapp/pages/metadata/locations/location.gsp. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is a7eefb5f69f6c50a3bffcb138bb8ea57cb41a9b6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216916.
References
Link Resource
https://github.com/openmrs/openmrs-module-adminui/commit/a7eefb5f69f6c50a3bffcb138bb8ea57cb41a9b6 Patch Third Party Advisory
https://github.com/openmrs/openmrs-module-adminui/releases/tag/1.6.0 Release Notes Third Party Advisory
https://github.com/openmrs/openmrs-module-adminui/pull/61 Patch Third Party Advisory
https://vuldb.com/?id.216916 Permissions Required Third Party Advisory
https://vuldb.com/?ctiid.216916 Permissions Required Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:openmrs:admin_ui_module:*:*:*:*:*:*:*:*

Information

Published : 2022-12-27 15:15

Updated : 2023-01-05 18:31


NVD link : CVE-2021-4291

Mitre link : CVE-2021-4291


JSON object : View

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Advertisement

dedicated server usa

Products Affected

openmrs

  • admin_ui_module