icon

We found results for “

CVE-2021-43698

Good to know:

icon

Date: November 29, 2021

phpWhois (last update Jun 30 2021) is affected by a Cross Site Scripting (XSS) vulnerability. In file example.php, the exit function will terminate the script and print the message to the user. The message will contain $_GET['query'] then there is a XSS vulnerability.

Language: PHP

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-79

Top Fix

icon

Upgrade Version

Upgrade to version theonedemon/phpwhois - 4.2.4;simple-updates/phpwhois - no_fix;truckersmp/phpwhois - 4.2.4;truckersmp/phpwhois - 4.2.3;fernleafsystems/phpwhois - no_fix;brightlocal/phpwhois - 4.2.4;niko9911/phpwhois - 4.2.4;phpwhois/phpwhois - 4.2.4;ricardosierra/phpwhois - v4.2.3;shirakun/phpwhois - 4.2.4;rockerox/phpwhois - no_fix;david-garcia/phpwhois - 4.2.4;serluck/phpwhois - 4.2.4;kazist/phpwhois - 4.2.4;ivankristianto/phpwhois - 4.2.4;jsmitty12/phpwhois - 4.2.4;ymnik13/phpwhois - 4.2.4

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): CHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): NONE

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): MEDIUM
Authentication (AU): NONE
Confidentiality (C): NONE
Integrity (I): PARTIAL
Availability (A): NONE
Additional information:

Do you need more information?

Contact Us