In Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete user functionality. When an authenticated user deletes a user having a XSS payload in the user id field, the javascript payload will be executed and allow an attacker to access the user’s credentials.
Solution:
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/zinclabs/zinc/commit/3376c248bade163430f9347742428f0a82cd322d | third party advisory patch |
https://www.mend.io/vulnerability-database/CVE-2022-32171 | third party advisory |