Static (Persistent) XSS Vulnerability exists in version 4.3.0 of Yclas when using the install/view/form.php script. An attacker can store XSS in the database through the vulnerable SITE_NAME parameter.
References
| Link | Resource |
|---|---|
| https://github.com/security-n/CVE-2021-38710 | Third Party Advisory |
| https://github.com/security-n/CVE-2021-38710 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/security-n/CVE-2021-38710 - Third Party Advisory |
24 Aug 2021, 14:39
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://github.com/security-n/CVE-2021-38710 - Third Party Advisory | |
| CPE | cpe:2.3:a:yclas:yclas:4.3.0:*:*:*:*:*:*:* | |
| CWE | CWE-79 | |
| CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.1 |
18 Aug 2021, 15:26
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2021-08-18 15:15
Updated : 2024-11-21 06:17
NVD link : CVE-2021-38710
Mitre link : CVE-2021-38710
CVE.ORG link : CVE-2021-38710
JSON object : View
Products Affected
yclas
- yclas
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
