A vulnerability classified as problematic was found in Nakiami Mellivora up to 2.1.x. Affected by this vulnerability is the function print_user_ip_log of the file include/layout/user.inc.php of the component Admin Panel. The manipulation of the argument $entry['ip'] leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.2.0 is able to address this issue. The name of the patch is e0b6965f8dde608a3d2621617c05695eb406cbb9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216955.
References
Link | Resource |
---|---|
https://github.com/Nakiami/mellivora/commit/e0b6965f8dde608a3d2621617c05695eb406cbb9 | Patch Third Party Advisory |
https://github.com/Nakiami/mellivora/releases/tag/v2.2.0 | Third Party Advisory |
https://vuldb.com/?ctiid.216955 | Third Party Advisory |
https://vuldb.com/?id.216955 | Third Party Advisory |
Configurations
History
29 Feb 2024, 01:25
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-28 09:15
Updated : 2024-05-17 01:36
NVD link : CVE-2019-25092
Mitre link : CVE-2019-25092
CVE.ORG link : CVE-2019-25092
JSON object : View
Products Affected
mellivora_project
- mellivora
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')