** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Th3-822 Rapidleech. This affects the function zip_go of the file classes/options/zip.php. The manipulation of the argument archive leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 885a87ea4ee5e14fa95801eca255604fb2e138c6. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218295. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://vuldb.com/?ctiid.218295 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.218295 | Permissions Required Third Party Advisory |
https://github.com/Th3-822/rapidleech/commit/885a87ea4ee5e14fa95801eca255604fb2e138c6 | Patch Third Party Advisory |
Configurations
Information
Published : 2023-01-13 10:15
Updated : 2023-01-23 09:54
NVD link : CVE-2021-4312
Mitre link : CVE-2021-4312
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
rapidleech
- rapidleech