Vulnerability Description
In TinyWebGallery v2.4, an XSS vulnerability is located in the `mkname`, `mkitem`, and `item` parameters of the `Add/Create` module. Remote attackers with low-privilege user accounts for backend access are able to inject malicious script codes into the `TWG Explorer` item listing. The request method to inject is POST and the attack vector is located on the application-side of the service. The injection point is the add/create input field and the execution point occurs in the item listing after the add or create.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tinywebgallery | Tinywebgallery | 2.4 |
Related Weaknesses (CWE)
References
- https://www.vulnerability-lab.com/get_content.php?id=1997Issue TrackingThird Party Advisory
- https://www.vulnerability-lab.com/get_content.php?id=1997Issue TrackingThird Party Advisory
FAQ
What is CVE-2017-16635?
CVE-2017-16635 is a vulnerability with a CVSS score of 5.4 (MEDIUM). In TinyWebGallery v2.4, an XSS vulnerability is located in the `mkname`, `mkitem`, and `item` parameters of the `Add/Create` module. Remote attackers with low-privilege user accounts for backend acces...
How severe is CVE-2017-16635?
CVE-2017-16635 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-16635?
Check the references section above for vendor advisories and patch information. Affected products include: Tinywebgallery Tinywebgallery.