An XSS issue was discovered in Sandoba CP:Shop v2016.1. The vulnerability is located in the `admin.php` file of the `./cpshop/` module. Remote attackers are able to inject their own script codes to the client-side requested vulnerable web-application parameters. The attack vector of the vulnerability is non-persistent and the request method to inject/execute is GET with the path, search, rename, or dir parameter.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-4952 An XSS issue was discovered in Sandoba CP:Shop v2016.1. The vulnerability is located in the `admin.php` file of the `./cpshop/` module. Remote attackers are able to inject their own script codes to the client-side requested vulnerable web-application parameters. The attack vector of the vulnerability is non-persistent and the request method to inject/execute is GET with the path, search, rename, or dir parameter.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T08:52:50.260Z

Reserved: 2018-06-29T00:00:00

Link: CVE-2018-13001

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-29T14:29:00.260

Modified: 2024-11-21T03:46:13.657

Link: CVE-2018-13001

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses