A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS 5.202406.d. This issue affects some unknown processing of the file /admin/cmsTagType/save of the component Tag Type Handler. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
History

Tue, 12 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Sanluan
Sanluan publiccms
CPEs cpe:2.3:a:sanluan:publiccms:5.202406.d:*:*:*:*:*:*:*
Vendors & Products Sanluan
Sanluan publiccms
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 Nov 2024 14:45:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as problematic, has been found in Sanluan PublicCMS 5.202406.d. This issue affects some unknown processing of the file /admin/cmsTagType/save of the component Tag Type Handler. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Title Sanluan PublicCMS Tag Type save cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-11-11T14:31:12.326Z

Updated: 2024-11-12T16:02:23.109Z

Reserved: 2024-11-11T06:48:34.514Z

Link: CVE-2024-11070

cve-icon Vulnrichment

Updated: 2024-11-12T16:02:15.820Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-11T15:15:04.863

Modified: 2024-11-12T13:55:21.227

Link: CVE-2024-11070

cve-icon Redhat

No data.