A security vulnerability has been detected in ZrLog up to 3.1.5. This vulnerability affects unknown code of the file /api/admin/template/config of the component Theme Configuration Form. Such manipulation of the argument footerLink leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://vuldb.com/?id.321765 | technical description vdb entry |
https://vuldb.com/?ctiid.321765 | signature permissions required |
https://vuldb.com/?submit.636176 | third party advisory |
https://github.com/SaaS5SaaS/CVE/issues/3 | issue tracking exploit |