A vulnerability has been found in phpipam and classified as problematic. Affected by this vulnerability is an unknown functionality of the file app/admin/import-export/import-load-data.php of the component Import Preview Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.5.0 is able to address this issue. The name of the patch is 22c797c3583001211fe7d31bccd3f1d4aeeb3bbc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-212863.
References
Link | Resource |
---|---|
https://github.com/phpipam/phpipam/releases/tag/v1.5.0 | Release Notes Third Party Advisory |
https://github.com/phpipam/phpipam/commit/22c797c3583001211fe7d31bccd3f1d4aeeb3bbc | Patch Third Party Advisory |
https://vuldb.com/?id.212863 | Third Party Advisory |
Configurations
Information
Published : 2022-11-02 13:15
Updated : 2022-11-03 18:32
NVD link : CVE-2022-3845
Mitre link : CVE-2022-3845
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
phpipam
- phpipam