A vulnerability, which was classified as problematic, has been found in Opencaching Deutschland oc-server3. This issue affects some unknown processing of the file htdocs/templates2/ocstyle/login.tpl of the component Login Page. The manipulation of the argument username leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 3296ebd61e7fe49e93b5755d5d7766d6e94a7667. It is recommended to apply a patch to fix this issue. The identifier VDB-216173 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/OpencachingDeutschland/oc-server3/commit/3296ebd61e7fe49e93b5755d5d7766d6e94a7667 | Patch Third Party Advisory |
https://github.com/OpencachingDeutschland/oc-server3/pull/893 | Patch Third Party Advisory |
https://vuldb.com/?id.216173 | Third Party Advisory |
https://github.com/OpencachingDeutschland/oc-server3/commit/3296ebd61e7fe49e93b5755d5d7766d6e94a7667 | Patch Third Party Advisory |
https://github.com/OpencachingDeutschland/oc-server3/pull/893 | Patch Third Party Advisory |
https://vuldb.com/?id.216173 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-12-17 13:15
Updated : 2024-11-21 07:35
NVD link : CVE-2022-4587
Mitre link : CVE-2022-4587
CVE.ORG link : CVE-2022-4587
JSON object : View
Products Affected
oc-server3_project
- oc-server3