First published: Thu Jul 29 2021(Updated: )
A stored cross-site scripting vulnerability exists in TCExam <= 14.8.1. Valid files uploaded via tce_select_mediafile.php with a filename beggining with a period will be rendered as text/html. An attacker with access to tce_select_mediafile.php could upload a malicious javascript payload which would be triggered when another user views the file.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tecnick Tcexam | <=14.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability CVE-2021-20112 is a stored cross-site scripting vulnerability in TCExam <= 14.8.1.
The vulnerability CVE-2021-20112 allows an attacker to upload a malicious JavaScript payload via tce_select_mediafile.php with a file name beginning with a period, which will be rendered as text/html and executed when accessed by a victim.
The severity of the vulnerability CVE-2021-20112 is medium with a CVSS score of 5.4.
The TCExam versions up to and inclusive of 14.8.1 are affected by CVE-2021-20112.
To fix the vulnerability CVE-2021-20112, it is recommended to update TCExam to a version higher than 14.8.1.