First published: Wed Dec 21 2022(Updated: )
A vulnerability classified as problematic was found in studygolang. This vulnerability affects the function Search of the file http/controller/search.go. The manipulation of the argument q leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 97ba556d42fa89dfaa7737e9cd3a8ddaf670bb23. It is recommended to apply a patch to fix this issue. VDB-216478 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Golang |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4273 is classified as a problematic vulnerability affecting the Search function in studygolang.
To fix CVE-2021-4273, ensure that user inputs are properly sanitized to prevent cross-site scripting attacks.
CVE-2021-4273 is associated with cross-site scripting (XSS) attacks initiated by manipulating the search input.
Yes, CVE-2021-4273 can be exploited remotely, making it particularly critical to address.
CVE-2021-4273 affects the file http/controller/search.go in the studygolang project.