First published: Sat Feb 08 2020(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Open-School Community Edition 2.2 allow remote attackers to inject arbitrary web script or HTML via the YII_CSRF_TOKEN HTTP cookie or the StudentDocument, StudentCategories, StudentPreviousDatas parameters to index.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open-school Open-school | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-9126 is medium with a CVSS score of 6.1.
To fix the cross-site scripting (XSS) vulnerabilities in Open-School Community Edition 2.2, update to a version higher than 2.2 that includes a patch for the vulnerabilities.
CVE-2014-9126 is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) and CWE-352 (Cross-Site Request Forgery (CSRF)).
Remote attackers can exploit the cross-site scripting (XSS) vulnerabilities in Open-School Community Edition 2.2 by injecting arbitrary web script or HTML via the YII_CSRF_TOKEN HTTP cookie or the StudentDocument, StudentCategories, StudentPreviousDatas parameters to index.php.
You can find more information about the cross-site scripting (XSS) vulnerabilities in Open-School Community Edition 2.2 at the following link: http://packetstormsecurity.com/files/130090/OpenSchool-Community-Edition-2.2-XSS-Access-Bypass.html