A vulnerability, which was classified as problematic, has been found in Opencaching Deutschland oc-server3. This issue affects some unknown processing of the file htdocs/templates2/ocstyle/login.tpl of the component Login Page. The manipulation of the argument username leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 3296ebd61e7fe49e93b5755d5d7766d6e94a7667. It is recommended to apply a patch to fix this issue. The identifier VDB-216173 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/OpencachingDeutschland/oc-server3/commit/3296ebd61e7fe49e93b5755d5d7766d6e94a7667 | Patch Third Party Advisory |
https://github.com/OpencachingDeutschland/oc-server3/pull/893 | Patch Third Party Advisory |
https://vuldb.com/?id.216173 | Third Party Advisory |
Configurations
Information
Published : 2022-12-17 05:15
Updated : 2022-12-22 07:38
NVD link : CVE-2022-4587
Mitre link : CVE-2022-4587
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
oc-server3_project
- oc-server3