Multiple stored XSS vulnerabilities in IrisNext Edition 9.5.16, which allows an authenticated (or compromised) user to inject malicious JavaScript in folder/file name within the application in order to grab other users’ sessions or execute malicious code in their browsers (1-click RCE).
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://varsnext.iriscorporate.com/history.html | product |
https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2021-27930.pdf | third party advisory exploit |