Objectplanet

Opinio

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 02.12.2025 09:56:16
  • Zuletzt bearbeitet 04.12.2025 17:49:40

Stored Cross-Site Scripting (XSS) in the survey-import feature of ObjectPlanet Opinio 7.26 rev12562 on web application allows an attacker to inject arbitrary JavaScript code, which executes in the browsing context of any visitor accessing the comprom...

  • EPSS 0.05%
  • Veröffentlicht 02.12.2025 09:51:59
  • Zuletzt bearbeitet 04.12.2025 17:52:30

Blind Server-Side Request Forgery (SSRF) in the survey-import feature of ObjectPlanet Opinio 7.26 rev12562 on Web-based platforms allows an attacker to force the server to perform HTTP GET requests via crafted import requests to an arbitrary ...

  • EPSS 0.03%
  • Veröffentlicht 02.12.2025 09:42:51
  • Zuletzt bearbeitet 04.12.2025 17:54:28

Cross-Site Request Forgery (CSRF) in the resource-management feature of ObjectPlanet Opinio 7.26 rev12562 allows to upload files on behalf of the connected users and then access such files without authentication.

  • EPSS 0.12%
  • Veröffentlicht 01.02.2024 22:15:55
  • Zuletzt bearbeitet 11.06.2025 17:15:35

Objectplanet Opinio version 7.22 and prior uses a cryptographically weak pseudo-random number generator (PRNG) coupled to a predictable seed, which could lead to an unauthenticated account takeover of any user on the application.

Exploit
  • EPSS 0.19%
  • Veröffentlicht 31.07.2021 17:15:07
  • Zuletzt bearbeitet 21.11.2024 05:20:05

ObjectPlanet Opinio before 7.15 allows XXE attacks via three steps: modify a .css file to have <!ENTITY content, create a .xml file for a generic survey template (containing a link to this .css file), and import this .xml file at the survey/admin/fol...

Exploit
  • EPSS 0.4%
  • Veröffentlicht 31.07.2021 17:15:07
  • Zuletzt bearbeitet 21.11.2024 05:20:05

ObjectPlanet Opinio before 7.14 allows Expression Language Injection via the admin/permissionList.do from parameter. This can be used to retrieve possibly sensitive serverInfo data.

Exploit
  • EPSS 5.03%
  • Veröffentlicht 31.07.2021 17:15:07
  • Zuletzt bearbeitet 21.11.2024 05:20:19

admin/file.do in ObjectPlanet Opinio before 7.15 allows Unrestricted File Upload of executable JSP files, resulting in remote code execution, because filePath can have directory traversal and fileContent can be valid JSP code.

Exploit
  • EPSS 0.28%
  • Veröffentlicht 30.07.2021 15:15:08
  • Zuletzt bearbeitet 21.11.2024 05:20:05

ObjectPlanet Opinio before 7.14 allows reflected XSS via the survey/admin/surveyAdmin.do?action=viewSurveyAdmin query string. (There is also stored XSS if input to survey/admin/*.do is accepted from untrusted users.)

  • EPSS 0.3%
  • Veröffentlicht 03.07.2017 03:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In ObjectPlanet Opinio before 7.6.4, there is XSS.