0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
ObjectPlanet Opinio 7.6.3 Cross Site Scripting Vulnerability
Author
Risk
[
Security Risk Medium
]0day-ID
Category
Date add
CVE
Platform
Vendor: ObjectPlanet Product: Opinio Version: Up to 7.6.3 (inclusive) Homepage: http://www.objectplanet.com/opinio/ CVE: CVE-2017-10798 Description ================ Reflected XSS vulnerability in ObjectPlanet Opinio up to version 7.6.3. Vulnerability ================ The /admin/reportPortal.do page is vulnerable to reflected XSS attacks through the userLanguage GET parameter. This page is available to remote, unauthenticated users. Proof of concept ================ https://localhost/admin/reportPortal.do?userLanguage=%22%3E%3C/script%3E%3Cscript%3Ealert(1);// Mitigations ================ Upgrade to version 7.6.4 or later. References ================ https://gist.github.com/kasperkarlsson/da24c64a5b56ff20059e31f74b2a19ac http://www.objectplanet.com/opinio/changelog.html Timeline ================ 2017-03-31 Vulnerability discovered 2017-04-01 Asked vendor how they prefer to receive vulnerability reports 2017-04-03 First response from vendor 2017-04-04 PoC sent to vendor 2017-04-05 Vendor confirms vulnerability. Patch will be included in next release within a few weeks. 2017-04-20 Patch released in version 7.6.4 - "Improved: Fixed some cross-site scripting vulnerabilities." http://www.objectplanet.com/opinio/changelog.html 2017-07-02 CVE Requested and received - "Use CVE-2017-10798." 2017-07-09 Public disclosure Discovered by Kasper Karlsson # 0day.today [2024-11-15] #