Current Description
A vulnerability, which was classified as problematic, has been found in Tribal Systems Zenario CMS. Affected by this issue is some unknown functionality of the file admin_organizer.js of the component Error Log Module. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is dfd0afacb26c3682a847bea7b49ea440b63f3baa. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-212816.
Analysis Description
A vulnerability, which was classified as problematic, has been found in Tribal Systems Zenario CMS. Affected by this issue is some unknown functionality of the file admin_organizer.js of the component Error Log Module. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is dfd0afacb26c3682a847bea7b49ea440b63f3baa. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-212816.
Severity
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].
Weakness Enumeration
CWE-ID | CWE Name | Source |
---|---|---|
CWE-79 | Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | NIST VulDB |
CWE-74 | Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’) | VulDB |
CWE-707 | Improper Neutralization | VulDB |
Change History
1 change records found show changes
Initial Analysis by NIST 11/03/2022 12:40:39 PM
Action | Type | Old Value | New Value |
---|---|---|---|
Added | CPE Configuration |
OR *cpe:2.3:a:tribalsystems:zenario:*:*:*:*:*:*:*:* versions up to (excluding) 8.7 |
|
Added | CVSS V3.1 |
NIST AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
Added | CWE |
NIST CWE-79 |
|
Changed | Reference Type |
https://github.com/TribalSystems/Zenario/commit/dfd0afacb26c3682a847bea7b49ea440b63f3baa No Types Assigned |
https://github.com/TribalSystems/Zenario/commit/dfd0afacb26c3682a847bea7b49ea440b63f3baa Patch, Third Party Advisory |
Changed | Reference Type |
https://vuldb.com/?id.212816 No Types Assigned |
https://vuldb.com/?id.212816 Third Party Advisory |