A vulnerability, which was classified as problematic, was found in Minichan. This affects an unknown part of the file reports.php. The manipulation of the argument headline leads to cross site scripting. It is possible to initiate the attack remotely. The identifier of the patch is fc0e732e58630cba318d6bf49d1388a7aa9d390e. It is recommended to apply a patch to fix this issue. The identifier VDB-217785 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/Minichan/Minichan/commit/fc0e732e58630cba318d6bf49d1388a7aa9d390e | Broken Link Patch |
https://github.com/Minichan/Minichan/pull/54 | Broken Link Third Party Advisory |
https://vuldb.com/?ctiid.217785 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.217785 | Permissions Required Third Party Advisory |
Configurations
History
29 Feb 2024, 01:20
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
20 Dec 2023, 02:10
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-14 20:15
Updated : 2024-05-17 01:17
NVD link : CVE-2017-20167
Mitre link : CVE-2017-20167
CVE.ORG link : CVE-2017-20167
JSON object : View
Products Affected
minichan
- minichan
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')