Multiple cross-site scripting (XSS) vulnerabilities in Uncanny Owl Tin Canny LearnDash Reporting before 3.4.4 allows authenticated remote attackers to inject arbitrary web script or HTML via the search_key GET Parameter in TinCan_Content_List_Table.php, message GET Parameter in licensing.php, tc_filter_group parameter in reporting-admin-menu.php, tc_filter_user parameter in reporting-admin-menu.php, tc_filter_course parameter in reporting-admin-menu.php, tc_filter_lesson parameter in reporting-admin-menu.php, tc_filter_module parameter in reporting-admin-menu.php, tc_filter_action parameter in reporting-admin-menu.php, tc_filter_data_range parameter in reporting-admin-menu.php, or tc_filter_data_range_last parameter in reporting-admin-menu.php.
References
Link | Resource |
---|---|
https://gist.github.com/michiiii/9501b878e7ba3c9fc2a7407ff8277fa5 | Third Party Advisory |
https://www.uncannyowl.com/knowledge-base/tin-canny-learndash-reporting-changelog/ | Release Notes Vendor Advisory |
Configurations
History
No history.
Information
Published : 2020-12-23 16:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-9439
Mitre link : CVE-2020-9439
CVE.ORG link : CVE-2020-9439
JSON object : View
Products Affected
uncannyowl
- tin_canny_reporting_for_learndash
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')