CVE-2020-15718
 
Severity Score
6.1
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
RosarioSIS 6.7.2 is vulnerable to XSS, caused by improper validation of user-supplied input by the PrintSchedules.php script. A remote attacker could exploit this vulnerability using the include_inactive parameter in a crafted URL.
RosarioSIS versiones 6.7.2, es vulnerable a un ataque de tipo XSS, causado por una comprobación inapropiada de la entrada suministrada por el usuario mediante el script PrintSchedules.php. Un atacante remoto podría explotar esta vulnerabilidad usando el parámetro include_inactive en una URL diseñada
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2020-07-14 CVE Reserved
- 2020-07-15 CVE Published
- 2023-03-31 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/184944 | Third Party Advisory | |
https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md | Release Notes | |
https://gitlab.com/francoisjacquet/rosariosis/-/issues/291 | Broken Link | |
https://gitlab.com/francoisjacquet/rosariosis/-/tags/v6.8-beta | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://gitlab.com/francoisjacquet/rosariosis/-/commit/89ae9de732024e3a2e99262aa98b400a1aa6975a | 2020-07-22 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Rosariosis Search vendor "Rosariosis" | Rosariosis Search vendor "Rosariosis" for product "Rosariosis" | 6.7.2 Search vendor "Rosariosis" for product "Rosariosis" and version "6.7.2" | - |
Affected
|