i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__MONITORING__CONFIG__ADDRESS, or SM2__C__MONITORING__CONFIG__ADDRESS.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-056 | exploit vendor advisory |
https://www.i-doit.org/news/ | release notes vendor advisory |
http://packetstormsecurity.com/files/162815/i-doit-1.15.2-Cross-Site-Scripting.html | exploit vdb entry third party advisory |