{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2021-4293","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2022-12-28T08:51:19.394Z","datePublished":"2022-12-28T08:53:51.600Z","dateUpdated":"2024-08-03T17:23:10.338Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2022-12-28T08:53:51.600Z"},"title":"gnuboard youngcart5 menu_list_update.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"gnuboard","product":"youngcart5","versions":[{"version":"5.4.5.0","status":"affected"},{"version":"5.4.5.1","status":"affected"}]}],"descriptions":[{"lang":"en","value":"** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in gnuboard youngcart5 up to 5.4.5.1. Affected is an unknown function of the file adm/menu_list_update.php. The manipulation of the argument me_link leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 5.4.5.2 is able to address this issue. The name of the patch is 70daa537adfa47b87af12d85f1e698fff01785ff. It is recommended to upgrade the affected component. VDB-216954 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in gnuboard youngcart5 bis 5.4.5.1 entdeckt. Betroffen hiervon ist ein unbekannter Ablauf der Datei adm/menu_list_update.php. Dank Manipulation des Arguments me_link mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Ein Aktualisieren auf die Version 5.4.5.2 vermag dieses Problem zu lösen. Der Patch wird als 70daa537adfa47b87af12d85f1e698fff01785ff bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}}],"timeline":[{"time":"2022-12-28T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2022-12-28T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2022-12-28T09:58:49.000Z","lang":"en","value":"VulDB last update"}],"references":[{"url":"https://vuldb.com/?id.216954","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.216954","tags":["signature","permissions-required"]},{"url":"https://github.com/gnuboard/youngcart5/commit/70daa537adfa47b87af12d85f1e698fff01785ff","tags":["patch"]},{"url":"https://github.com/gnuboard/youngcart5/releases/tag/5.4.5.2","tags":["patch"]}],"tags":["unsupported-when-assigned"]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T17:23:10.338Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.216954","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.216954","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/gnuboard/youngcart5/commit/70daa537adfa47b87af12d85f1e698fff01785ff","tags":["patch","x_transferred"]},{"url":"https://github.com/gnuboard/youngcart5/releases/tag/5.4.5.2","tags":["patch","x_transferred"]}]}]}}