A weakness has been identified in O2OA up to 10.0-410. This affects an unknown part of the file /x_organization_assemble_control/jaxrs/person/ of the component Personal Profile Page. Executing manipulation of the argument Description can lead to cross site scripting. The attack can be launched remotely. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://vuldb.com/?id.321863 | technical description vdb entry |
https://vuldb.com/?ctiid.321863 | signature permissions required |
https://vuldb.com/?submit.637131 | third party advisory |
https://github.com/o2oa/o2oa/issues/172 | issue tracking |
https://github.com/o2oa/o2oa/issues/172#issuecomment-3212882108 | issue tracking |