TemaTres 3.0 has stored XSS via the value parameter to the vocab/admin.php?vocabulario_id=list URI.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.hackpuntes.com | third party advisory not applicable |
https://sourceforge.net/p/tematres/mailman/tematres-help/ | third party advisory mailing list |
https://github.com/tematres/TemaTres-Vocabulary-Server/commits/master | third party advisory patch |
https://medium.com/%40Pablo0xSantiago/cve-2019-14343-ebc120800053 | |
http://packetstormsecurity.com/files/155376/TemaTres-3.0-Cross-Site-Scripting.html | mailing list exploit vdb entry third party advisory |