CVE-2021-4291

A vulnerability was found in OpenMRS Admin UI Module up to 1.5.x. It has been declared as problematic. This vulnerability affects unknown code of the file omod/src/main/webapp/pages/metadata/locations/location.gsp. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is a7eefb5f69f6c50a3bffcb138bb8ea57cb41a9b6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216916.
References
Link Resource
https://github.com/openmrs/openmrs-module-adminui/commit/a7eefb5f69f6c50a3bffcb138bb8ea57cb41a9b6 Patch Third Party Advisory
https://github.com/openmrs/openmrs-module-adminui/pull/61 Patch Third Party Advisory
https://github.com/openmrs/openmrs-module-adminui/releases/tag/1.6.0 Release Notes Third Party Advisory
https://vuldb.com/?ctiid.216916 Permissions Required Third Party Advisory
https://vuldb.com/?id.216916 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openmrs:admin_ui_module:*:*:*:*:*:*:*:*

History

29 Feb 2024, 01:33

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-27 23:15

Updated : 2024-05-17 02:03


NVD link : CVE-2021-4291

Mitre link : CVE-2021-4291

CVE.ORG link : CVE-2021-4291


JSON object : View

Products Affected

openmrs

  • admin_ui_module
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')