A vulnerability was detected in O2OA up to 10.0-410. This issue affects some unknown processing of the file /x_program_center/jaxrs/script of the component Personal Profile Page. The manipulation of the argument name/alias/description results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used. The vendor replied in the GitHub issue (translated from simplified Chinese): "This issue will be fixed in the new version."
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://vuldb.com/?id.321865 | technical description vdb entry |
https://vuldb.com/?ctiid.321865 | signature permissions required |
https://vuldb.com/?submit.637218 | third party advisory |
https://github.com/o2oa/o2oa/issues/173 | issue tracking |
https://github.com/o2oa/o2oa/issues/173#issuecomment-3212881726 | issue tracking |
https://github.com/o2oa/o2oa/issues/173#issue-3332925583 | issue tracking exploit |