A vulnerability was found in OpenSeaMap online_chart 1.2. It has been classified as problematic. Affected is the function init of the file index.php. The manipulation of the argument mtext leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version staging is able to address this issue. The patch is identified as 8649157158f921590d650e2d2f4bdf0df1017e9d. It is recommended to upgrade the affected component. VDB-220218 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/OpenSeaMap/online_chart/commit/8649157158f921590d650e2d2f4bdf0df1017e9d | Patch |
https://github.com/OpenSeaMap/online_chart/pull/70 | Patch |
https://github.com/OpenSeaMap/online_chart/releases/tag/staging | Patch |
https://vuldb.com/?ctiid.220218 | Permissions Required |
https://vuldb.com/?id.220218 | Third Party Advisory |
Configurations
History
29 Feb 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-07 10:15
Updated : 2024-05-17 01:03
NVD link : CVE-2015-10074
Mitre link : CVE-2015-10074
CVE.ORG link : CVE-2015-10074
JSON object : View
Products Affected
openseamap
- online_chart
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')