The file upload functionality in qdPM 9.1 doesn't check the file description, which allows remote authenticated attackers to inject web script or HTML via the attachments info parameter, aka XSS. This can occur during creation of a ticket, project, or task.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://qdpm.net/qdpm-release-notes-free-project-management | release notes vendor advisory |
https://sourceforge.net/projects/qdpm/ | third party advisory product |
https://github.com/Kajmer/CVEs/blob/main/CVE-2020-26166.md | third party advisory |