CVE-2017-20167

A vulnerability, which was classified as problematic, was found in Minichan. This affects an unknown part of the file reports.php. The manipulation of the argument headline leads to cross site scripting. It is possible to initiate the attack remotely. The identifier of the patch is fc0e732e58630cba318d6bf49d1388a7aa9d390e. It is recommended to apply a patch to fix this issue. The identifier VDB-217785 was assigned to this vulnerability.
References
Link Resource
https://github.com/Minichan/Minichan/commit/fc0e732e58630cba318d6bf49d1388a7aa9d390e Broken Link Patch
https://github.com/Minichan/Minichan/pull/54 Broken Link Third Party Advisory
https://vuldb.com/?ctiid.217785 Permissions Required Third Party Advisory
https://vuldb.com/?id.217785 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:minichan:minichan:*:*:*:*:*:*:*:*

History

29 Feb 2024, 01:20

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad fue encontrada en Minichan y clasificada como problemática. Una parte desconocida del archivo reports.php afecta a esta vulnerabilidad. La manipulación del argumento title conduce a cross site scripting. Es posible iniciar el ataque de forma remota. El identificador del parche es fc0e732e58630cba318d6bf49d1388a7aa9d390e. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asignó el identificador VDB-217785.

20 Dec 2023, 02:10

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-14 20:15

Updated : 2024-05-17 01:17


NVD link : CVE-2017-20167

Mitre link : CVE-2017-20167

CVE.ORG link : CVE-2017-20167


JSON object : View

Products Affected

minichan

  • minichan
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')