A vulnerability was found in DiscuzX up to 3.4-20200818. It has been classified as problematic. Affected is the function show_next_step of the file upload/install/include/install_function.php. The manipulation of the argument uchidden leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 3.4-20210119 is able to address this issue. The name of the patch is 4a9673624f46f7609486778ded9653733020c567. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-258612.
References
Configurations
No configuration.
History
21 Nov 2024, 05:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/codersclub/DiscuzX/commit/4a9673624f46f7609486778ded9653733020c567 - | |
References | () https://vuldb.com/?ctiid.258612 - | |
References | () https://vuldb.com/?id.258612 - |
11 Apr 2024, 01:08
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
31 Mar 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-31 09:15
Updated : 2024-11-21 05:30
NVD link : CVE-2020-36828
Mitre link : CVE-2020-36828
CVE.ORG link : CVE-2020-36828
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')