First published: Fri Jul 09 2021(Updated: )
A stored cross site scripting (XSS) vulnerability in the 'Users Access Groups' feature of Rukovoditel 2.7.2 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Name' parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rukovoditel Rukovoditel | =2.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-35986.
The title of the vulnerability is 'A stored cross site scripting (XSS) vulnerability in the Users Access Groups feature of Rukovoditel'.
The vulnerability is a stored cross site scripting (XSS) vulnerability in the 'Users Access Groups' feature of Rukovoditel 2.7.2, which allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Name' parameter.
The Rukovoditel version 2.7.2 is affected by this vulnerability.
The severity of CVE-2020-35986 is medium with a CVSS score of 5.4.
An authenticated attacker can exploit this vulnerability by entering a crafted payload into the 'Name' parameter of the Users Access Groups feature in Rukovoditel 2.7.2.
It is recommended to update Rukovoditel to a version that includes a fix for CVE-2020-35986.