LedgerSMB does not sufficiently HTML-encode error messages sent to the browser. By sending a specially crafted URL to an authenticated user, this flaw can be abused for remote code execution and information disclosure.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://huntr.dev/bounties/ef7f4cf7-3a81-4516-b261-f5b6ac21430c | third party advisory |
https://github.com/ledgersmb/ledgersmb/commit/98fa476d46a4a7e5e9492ed69b4fa190be5547fc | third party advisory patch |
https://ledgersmb.org/cve-2021-3694-cross-site-scripting | vendor advisory |
https://www.debian.org/security/2021/dsa-4962 | third party advisory vendor advisory |