GUnet Open eClass (aka openeclass) before 3.12.2 allows XSS via the modules/auth/formuser.php auth parameter.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://hg.gunet.gr/openeclass/rev/e0ed11f5768d | vendor advisory exploit |
https://docs.openeclass.org/el/current#%CE%AD%CE%BA%CE%B4%CE%BF%CF%83%CE%B7_3122 | third party advisory release notes |
https://emaragkos.gr/cve-2021-44266/ | third party advisory |