Описание
A vulnerability was detected in O2OA up to 10.0-410. Affected is an unknown function of the file /x_query_assemble_designer/jaxrs/importmodel of the component Personal Profile Page. Performing manipulation of the argument description/applicationName/queryName results in cross site scripting. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
Ссылки
- ExploitIssue TrackingThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- Permissions RequiredVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- ExploitIssue TrackingThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 10.0-410 (включая)
cpe:2.3:a:zoneland:o2oa:*:*:*:*:*:*:*:*
EPSS
Процентиль: 18%
0.00057
Низкий
3.5 Low
CVSS3
5.4 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-79
CWE-79
EPSS
Процентиль: 18%
0.00057
Низкий
3.5 Low
CVSS3
5.4 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-79
CWE-79