RosarioSIS 6.7.2 is vulnerable to XSS, caused by improper validation of user-supplied input by the PrintSchedules.php script. A remote attacker could exploit this vulnerability using the include_inactive parameter in a crafted URL.
References
Link | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/184944 | Third Party Advisory VDB Entry |
https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md | Release Notes Third Party Advisory |
https://gitlab.com/francoisjacquet/rosariosis/-/commit/89ae9de732024e3a2e99262aa98b400a1aa6975a | Patch Third Party Advisory |
https://gitlab.com/francoisjacquet/rosariosis/-/issues/291 | Broken Link |
https://gitlab.com/francoisjacquet/rosariosis/-/tags/v6.8-beta | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-07-15T19:02:52
Updated: 2020-07-15T19:02:52
Reserved: 2020-07-14T00:00:00
Link: CVE-2020-15718
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-07-15T20:15:13.570
Modified: 2020-07-22T17:00:36.797
Link: CVE-2020-15718
JSON object: View
Redhat Information
No data.
CWE