Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6p3j-529j-2cwq

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The WYSIWYG editor applet in activeWeb contentserver CMS before 5.6.2964 only filters malicious tags from articles sent to admin/applets/wysiwyg/rendereditor.asp, which allows remote authenticated users to inject arbitrary JavaScript via a request to admin/worklist/worklist_edit.asp.

The WYSIWYG editor applet in activeWeb contentserver CMS before 5.6.2964 only filters malicious tags from articles sent to admin/applets/wysiwyg/rendereditor.asp, which allows remote authenticated users to inject arbitrary JavaScript via a request to admin/worklist/worklist_edit.asp.

EPSS

Процентиль: 92%
0.08689
Низкий

Связанные уязвимости

nvd
больше 18 лет назад

The WYSIWYG editor applet in activeWeb contentserver CMS before 5.6.2964 only filters malicious tags from articles sent to admin/applets/wysiwyg/rendereditor.asp, which allows remote authenticated users to inject arbitrary JavaScript via a request to admin/worklist/worklist_edit.asp.

EPSS

Процентиль: 92%
0.08689
Низкий