Vulnerability CVE-2020-21993


Published: 2021-04-28

Description:
In WEMS Limited Enterprise Manager 2.58, input passed to the GET parameter 'email' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site.

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
WEMS -> Enterprise manager 

 References:
https://cxsecurity.com/issue/WLB-2020010032
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5551.php

Copyright 2024, cxsecurity.com

 

Back to Top