We found results for “”
CVE-2021-43698
Good to know:
Date: November 29, 2021
phpWhois (last update Jun 30 2021) is affected by a Cross Site Scripting (XSS) vulnerability. In file example.php, the exit function will terminate the script and print the message to the user. The message will contain $_GET['query'] then there is a XSS vulnerability.
Language: PHP
Severity Score
Severity Score
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-79Top Fix
Upgrade Version
Upgrade to version theonedemon/phpwhois - 4.2.4;simple-updates/phpwhois - no_fix;truckersmp/phpwhois - 4.2.4;truckersmp/phpwhois - 4.2.3;fernleafsystems/phpwhois - no_fix;brightlocal/phpwhois - 4.2.4;niko9911/phpwhois - 4.2.4;phpwhois/phpwhois - 4.2.4;ricardosierra/phpwhois - v4.2.3;shirakun/phpwhois - 4.2.4;rockerox/phpwhois - no_fix;david-garcia/phpwhois - 4.2.4;serluck/phpwhois - 4.2.4;kazist/phpwhois - 4.2.4;ivankristianto/phpwhois - 4.2.4;jsmitty12/phpwhois - 4.2.4;ymnik13/phpwhois - 4.2.4
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | CHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | LOW |
| Availability (A): | NONE |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | NETWORK |
| Access Complexity (AC): | MEDIUM |
| Authentication (AU): | NONE |
| Confidentiality (C): | NONE |
| Integrity (I): | PARTIAL |
| Availability (A): | NONE |
| Additional information: |
Vulnerabilities
Projects
Contact Us


