A vulnerability was found in CSZCMS 1.3.0. It has been classified as problematic. This affects an unknown part of the file /admin/settings/ of the component Site Settings Page. The manipulation of the argument Additional Meta Tag with the input <svg><animate onbegin=alert(1) attributeName=x dur=1s> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246129 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/t34t/CVE/blob/main/CSZCMS/0-Store-XSS-Vulnerability-in-cszcmsV1.3.0.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.246129 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.246129 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-11-27 00:15
Updated : 2024-05-17 02:33
NVD link : CVE-2023-6303
Mitre link : CVE-2023-6303
CVE.ORG link : CVE-2023-6303
JSON object : View
Products Affected
cskaza
- cszcms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')