vendor:
OpenSIS
by:
Eric Salario
5,4
CVSS
MEDIUM
Reflected Cross-Site Scripting (XSS)
79
CWE
Product Name: OpenSIS
Affected Version From: 8.0
Affected Version To: 8.0
Patch Exists: Yes
Related CWE: CVE-2021-40310
CPE: a:os4ed:opensis:8.0
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=40310, https://www.infosecmatter.com/nessus-plugin-library/?id=40326, https://www.infosecmatter.com/nessus-plugin-library/?id=37418, https://www.infosecmatter.com/nessus-plugin-library/?id=35763, https://www.infosecmatter.com/nessus-plugin-library/?id=35626
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux
2021
OpenSIS 8.0 – ‘cp_id_miss_attn’ Reflected Cross-Site Scripting (XSS)
OpenSIS Community Edition version 8.0 is affected by a cross-site scripting (XSS) vulnerability in the TakeAttendance.php via the cp_id_miss_attn parameter. An attacker can exploit this vulnerability by sending a maliciously crafted request to the vulnerable application. This will allow the attacker to execute arbitrary HTML and JavaScript code in the context of the affected application.
Mitigation:
The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of OpenSIS Community Edition.