CVE-2020-9439
MEDIUM WAF: HighMultiple cross-site scripting (XSS) vulnerabilities in Uncanny Owl Tin Canny LearnDash Reporting before 3.4.4 allows authenticated remote attackers to inject arbitrary web script or HTML via the search_key GET Parameter in TinCan_Content_List_Table.php, message GET Parameter in licensing.php, tc_filter_group parameter in reporting-admin-menu.php, tc_filter_user parameter in reporting-admin-menu.php, tc_filter_course parameter in reporting-admin-menu.php, tc_filter_lesson parameter in reporting-admin-menu.php, tc_filter_module parameter in reporting-admin-menu.php, tc_filter_action parameter in reporting-admin-menu.php, tc_filter_data_range parameter in reporting-admin-menu.php, or tc_filter_data_range_last parameter in reporting-admin-menu.php.
WAF Coverage Analysis
OWASP: A03:2021 Injection
Affected Software
| Vendor | Product | Version |
|---|---|---|
| uncannyowl | tin_canny_reporting_for_learndash | up to 3.4.4 |
References
- gist.github.com (Third Party Advisory)
- www.uncannyowl.com (Release Notes, Vendor Advisory)