Invision Community 4.5.4 is affected by cross-site scripting (XSS) in the Field Name field. This vulnerability can allow an attacker to inject the XSS payload in Field Name and each time any user will open that, the XSS triggers and the attacker can able to steal the cookie according to the crafted payload.
References
Link | Resource |
---|---|
http://invision.com | Not Applicable |
https://www.exploit-db.com/exploits/49188 | Exploit Third Party Advisory VDB Entry |
Configurations
History
04 Jan 2021, 15:13
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 4.8 |
CWE | CWE-79 | |
References | (MISC) http://invision.com - Not Applicable | |
References | (MISC) https://www.exploit-db.com/exploits/49188 - Exploit, Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:invisioncommunity:community:4.5.4:*:*:*:*:*:*:* |
30 Dec 2020, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2020-12-30 15:15
Updated : 2023-12-10 13:41
NVD link : CVE-2020-29477
Mitre link : CVE-2020-29477
CVE.ORG link : CVE-2020-29477
JSON object : View
Products Affected
invisioncommunity
- community
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')