CVE-2018-12652
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to inject malicious JavaScript into the Adrenalin HRMS software, which can then be executed in the browsers of users who visit a specially crafted link. To exploit this, the attacker needs to trick users into clicking on a link that includes their malicious code in the parameters of the request.
Technical Description
A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Adrenalin 5.4 HRMS Software. The user supplied input containing JavaScript is echoed back in JavaScript code in an HTML response via the LeaveEmployeeSearch.aspx prntFrmName or prntDDLCntrlName parameter.
CVSS Vector Analysis
Vector String
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 25, 2019
about 7 years ago
Last Modified
Mar 2, 2026
about 1 month ago
Vendor
myadrenalin
Product
adrenalin
Related Vulnerabilities
An attacker can inject harmful JavaScript code into the Adrenalin HRMS system, which can then be executed in the browsers of users who view the affected report. This vulnerability requires the attacker to manipulate the 'ReportId' parameter on a specific page, allowing them to target users without needing to authenticate.
This vulnerability allows an attacker to inject malicious JavaScript code into the HR management software, which can then be executed in the browsers of users who view the affected page. It requires the attacker to trick a user into clicking a specially crafted link that includes the harmful code in the search parameters.
This vulnerability allows an attacker to inject malicious scripts into the Adrenalin HRMS software, which can then be executed in the browsers of users who visit the affected page. To exploit this, the attacker needs to trick users into clicking a specially crafted link that includes the harmful script.
This vulnerability allows an attacker to inject malicious JavaScript into a webpage, which can then execute in the browser of anyone who visits that page. To exploit this, the attacker needs to trick a user into clicking a link that includes their harmful code in the request to the affected HRMS software.