Objectplanet : Security Vulnerabilities (CVSS score >= 1)
# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2020-26806 |
434 |
|
Exec Code Dir. Trav. |
2021-07-31 |
2021-08-09 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
admin/file.do in ObjectPlanet Opinio before 7.15 allows Unrestricted File Upload of executable JSP files, resulting in remote code execution, because filePath can have directory traversal and fileContent can be valid JSP code. |
2 |
CVE-2020-26565 |
917 |
|
|
2021-07-31 |
2021-08-10 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
ObjectPlanet Opinio before 7.14 allows Expression Language Injection via the admin/permissionList.do from parameter. This can be used to retrieve possibly sensitive serverInfo data. |
3 |
CVE-2020-26564 |
611 |
|
|
2021-07-31 |
2021-08-09 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
ObjectPlanet Opinio before 7.15 allows XXE attacks via three steps: modify a .css file to have <!ENTITY content, create a .xml file for a generic survey template (containing a link to this .css file), and import this .xml file at the survey/admin/folderSurvey.do?action=viewImportSurvey['importFile'] URI. The XXE can then be triggered at a admin/preview.do?action=previewSurvey&surveyId= URI. |
4 |
CVE-2020-26563 |
79 |
|
XSS |
2021-07-30 |
2021-08-02 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
ObjectPlanet Opinio before 7.14 allows reflected XSS via the survey/admin/surveyAdmin.do?action=viewSurveyAdmin query string. (There is also stored XSS if input to survey/admin/*.do is accepted from untrusted users.) |
5 |
CVE-2017-10798 |
79 |
|
XSS |
2017-07-03 |
2017-07-05 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
In ObjectPlanet Opinio before 7.6.4, there is XSS. |
Total number of vulnerabilities :
5
Page :
1
(This Page)