A vulnerability, which was classified as problematic, was found in innologi appointments Extension up to 2.0.5 on TYPO3. This affects an unknown part of the component Appointment Handler. The manipulation of the argument formfield leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.6 is able to address this issue. The identifier of the patch is 986d3cb34e5e086c6f04e061f600ffc5837abe7f. It is recommended to upgrade the affected component. The identifier VDB-217353 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/innologi/typo3-appointments/commit/986d3cb34e5e086c6f04e061f600ffc5837abe7f | Patch |
https://github.com/innologi/typo3-appointments/releases/tag/2.0.6 | Release Notes Third Party Advisory |
https://vuldb.com/?ctiid.217353 | Third Party Advisory |
https://vuldb.com/?id.217353 | Third Party Advisory |
Configurations
History
29 Feb 2024, 01:25
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-04 10:15
Updated : 2024-05-17 01:36
NVD link : CVE-2019-25094
Mitre link : CVE-2019-25094
CVE.ORG link : CVE-2019-25094
JSON object : View
Products Affected
innologi
- appointment_scheduler
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')