CVE-2021-4312

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Th3-822 Rapidleech. This affects the function zip_go of the file classes/options/zip.php. The manipulation of the argument archive leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named 885a87ea4ee5e14fa95801eca255604fb2e138c6. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218295. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link Resource
https://github.com/Th3-822/rapidleech/commit/885a87ea4ee5e14fa95801eca255604fb2e138c6 Patch
https://vuldb.com/?ctiid.218295 Permissions Required Third Party Advisory
https://vuldb.com/?id.218295 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:rapidleech:rapidleech:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:40

Type Values Removed Values Added
Summary ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Th3-822 Rapidleech. This affects the function zip_go of the file classes/options/zip.php. The manipulation of the argument archive leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named 885a87ea4ee5e14fa95801eca255604fb2e138c6. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218295. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Th3-822 Rapidleech. This affects the function zip_go of the file classes/options/zip.php. The manipulation of the argument archive leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named 885a87ea4ee5e14fa95801eca255604fb2e138c6. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218295. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

04 Nov 2023, 02:55

Type Values Removed Values Added
CWE CWE-79

20 Oct 2023, 14:15

Type Values Removed Values Added
CWE CWE-79
Summary ** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Th3-822 Rapidleech. This affects the function zip_go of the file classes/options/zip.php. The manipulation of the argument archive leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 885a87ea4ee5e14fa95801eca255604fb2e138c6. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218295. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Th3-822 Rapidleech. This affects the function zip_go of the file classes/options/zip.php. The manipulation of the argument archive leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named 885a87ea4ee5e14fa95801eca255604fb2e138c6. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218295. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

23 Jan 2023, 17:54

Type Values Removed Values Added
References (MISC) https://vuldb.com/?ctiid.218295 - (MISC) https://vuldb.com/?ctiid.218295 - Permissions Required, Third Party Advisory
References (MISC) https://vuldb.com/?id.218295 - (MISC) https://vuldb.com/?id.218295 - Permissions Required, Third Party Advisory
References (MISC) https://github.com/Th3-822/rapidleech/commit/885a87ea4ee5e14fa95801eca255604fb2e138c6 - (MISC) https://github.com/Th3-822/rapidleech/commit/885a87ea4ee5e14fa95801eca255604fb2e138c6 - Patch, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
First Time Rapidleech rapidleech
Rapidleech
CPE cpe:2.3:a:rapidleech:rapidleech:*:*:*:*:*:*:*:*

13 Jan 2023, 18:23

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-13 18:15

Updated : 2024-05-14 09:48


NVD link : CVE-2021-4312

Mitre link : CVE-2021-4312

CVE.ORG link : CVE-2021-4312


JSON object : View

Products Affected

rapidleech

  • rapidleech
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')