A vulnerability was found in OpenMRS Admin UI Module up to 1.5.x. It has been declared as problematic. This vulnerability affects unknown code of the file omod/src/main/webapp/pages/metadata/locations/location.gsp. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is a7eefb5f69f6c50a3bffcb138bb8ea57cb41a9b6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216916.
References
Link | Resource |
---|---|
https://github.com/openmrs/openmrs-module-adminui/commit/a7eefb5f69f6c50a3bffcb138bb8ea57cb41a9b6 | Patch Third Party Advisory |
https://github.com/openmrs/openmrs-module-adminui/releases/tag/1.6.0 | Release Notes Third Party Advisory |
https://github.com/openmrs/openmrs-module-adminui/pull/61 | Patch Third Party Advisory |
https://vuldb.com/?id.216916 | Permissions Required Third Party Advisory |
https://vuldb.com/?ctiid.216916 | Permissions Required Third Party Advisory |
Configurations
Information
Published : 2022-12-27 15:15
Updated : 2023-01-05 18:31
NVD link : CVE-2021-4291
Mitre link : CVE-2021-4291
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
openmrs
- admin_ui_module