A Cross-site scripting (XSS) vulnerability exists in the comment section in ZrLog 2.1.3, which allows remote attackers to inject arbitrary web script and stolen administrator cookies via the nickname parameter and gain access to the admin panel.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/94fzb/zrlog/issues/56 | third party advisory patch |
https://gist.github.com/T-pod/d9405dbd61243990d65d55c5df0fcbe6 | third party advisory patch |
https://github.com/94fzb/zrlog/commit/b921c1ae03b8290f438657803eee05226755c941 | third party advisory patch |