An issue was discovered in IT ITems DataBase (ITDB) through 1.23. The vulnerability exists due to insufficient filtration of user-supplied data in the "value" HTTP POST parameter passed to the "itdb-1.23/js/DataTables-1.8.2/examples/examples_support/editable_ajax.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
Advisories
Source ID Title
EUVD EUVD EUVD-2016-1401 An issue was discovered in IT ITems DataBase (ITDB) through 1.23. The vulnerability exists due to insufficient filtration of user-supplied data in the "value" HTTP POST parameter passed to the "itdb-1.23/js/DataTables-1.8.2/examples/examples_support/editable_ajax.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T03:14:42.425Z

Reserved: 2017-02-09T00:00:00

Link: CVE-2016-10216

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-02-10T07:59:00.183

Modified: 2025-04-20T01:37:25.860

Link: CVE-2016-10216

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses