Multiple cross-site scripting (XSS) vulnerabilities in Uncanny Owl Tin Canny LearnDash Reporting before 3.4.4 allows authenticated remote attackers to inject arbitrary web script or HTML via the search_key GET Parameter in TinCan_Content_List_Table.php, message GET Parameter in licensing.php, tc_filter_group parameter in reporting-admin-menu.php, tc_filter_user parameter in reporting-admin-menu.php, tc_filter_course parameter in reporting-admin-menu.php, tc_filter_lesson parameter in reporting-admin-menu.php, tc_filter_module parameter in reporting-admin-menu.php, tc_filter_action parameter in reporting-admin-menu.php, tc_filter_data_range parameter in reporting-admin-menu.php, or tc_filter_data_range_last parameter in reporting-admin-menu.php.
References
Link | Resource |
---|---|
https://gist.github.com/michiiii/9501b878e7ba3c9fc2a7407ff8277fa5 | Third Party Advisory |
https://www.uncannyowl.com/knowledge-base/tin-canny-learndash-reporting-changelog/ | Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-12-23T15:47:14
Updated: 2020-12-23T15:47:14
Reserved: 2020-02-27T00:00:00
Link: CVE-2020-9439
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-12-23T16:15:13.187
Modified: 2020-12-23T19:24:56.310
Link: CVE-2020-9439
JSON object: View
Redhat Information
No data.
CWE