Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jgj8-6rfv-fv92

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.1

Описание

Reflected XSS vulnerability in Shaarli v0.9.1 allows an unauthenticated attacker to inject JavaScript via the searchtags parameter to index.php. If the victim is an administrator, an attacker can (for example) take over the admin session or change global settings or add/delete links. It is also possible to execute JavaScript against unauthenticated users.

Reflected XSS vulnerability in Shaarli v0.9.1 allows an unauthenticated attacker to inject JavaScript via the searchtags parameter to index.php. If the victim is an administrator, an attacker can (for example) take over the admin session or change global settings or add/delete links. It is also possible to execute JavaScript against unauthenticated users.

EPSS

Процентиль: 77%
0.01038
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 8 лет назад

Reflected XSS vulnerability in Shaarli v0.9.1 allows an unauthenticated attacker to inject JavaScript via the searchtags parameter to index.php. If the victim is an administrator, an attacker can (for example) take over the admin session or change global settings or add/delete links. It is also possible to execute JavaScript against unauthenticated users.

CVSS3: 6.1
nvd
больше 8 лет назад

Reflected XSS vulnerability in Shaarli v0.9.1 allows an unauthenticated attacker to inject JavaScript via the searchtags parameter to index.php. If the victim is an administrator, an attacker can (for example) take over the admin session or change global settings or add/delete links. It is also possible to execute JavaScript against unauthenticated users.

CVSS3: 6.1
debian
больше 8 лет назад

Reflected XSS vulnerability in Shaarli v0.9.1 allows an unauthenticate ...

EPSS

Процентиль: 77%
0.01038
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79