CVE-2021-4312

** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Th3-822 Rapidleech. This affects the function zip_go of the file classes/options/zip.php. The manipulation of the argument archive leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 885a87ea4ee5e14fa95801eca255604fb2e138c6. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218295. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://vuldb.com/?ctiid.218295 Permissions Required Third Party Advisory
https://vuldb.com/?id.218295 Permissions Required Third Party Advisory
https://github.com/Th3-822/rapidleech/commit/885a87ea4ee5e14fa95801eca255604fb2e138c6 Patch Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:rapidleech:rapidleech:*:*:*:*:*:*:*:*

Information

Published : 2023-01-13 10:15

Updated : 2023-01-23 09:54


NVD link : CVE-2021-4312

Mitre link : CVE-2021-4312


JSON object : View

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Advertisement

dedicated server usa

Products Affected

rapidleech

  • rapidleech