Multiple stored XSS vulnerabilities in IrisNext Edition 9.5.16, which allows an authenticated (or compromised) user to inject malicious JavaScript in folder/file name within the application in order to grab other users’ sessions or execute malicious code in their browsers (1-click RCE).
References
Link | Resource |
---|---|
https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2021-27930.pdf | Exploit Third Party Advisory |
https://varsnext.iriscorporate.com/history.html | Product |
https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2021-27930.pdf | Exploit Third Party Advisory |
https://varsnext.iriscorporate.com/history.html | Product |
Configurations
History
No history.
Information
Published : 2021-07-06 12:15
Updated : 2024-11-21 05:58
NVD link : CVE-2021-27930
Mitre link : CVE-2021-27930
CVE.ORG link : CVE-2021-27930
JSON object : View
Products Affected
irislink
- irisnext
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')