Cross-site scripting (XSS) vulnerability in the file browser in Guacamole 0.9.8 and 0.9.9, when file transfer is enabled to a location shared by multiple users, allows remote authenticated users to inject arbitrary web script or HTML via a crafted filename. NOTE: this vulnerability was fixed in guacamole.war on 2016-01-13, but the version number was not changed.
References
Link | Resource |
---|---|
https://sourceforge.net/p/guacamole/news/2016/02/security-advisory---stored-xss-cve-2016-1566--guac-1465/ | Third Party Advisory |
https://sourceforge.net/p/guacamole/news/2016/02/security-advisory---stored-xss-cve-2016-1566--guac-1465/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://sourceforge.net/p/guacamole/news/2016/02/security-advisory---stored-xss-cve-2016-1566--guac-1465/ - Third Party Advisory |
Information
Published : 2017-02-02 15:59
Updated : 2024-11-21 02:46
NVD link : CVE-2016-1566
Mitre link : CVE-2016-1566
CVE.ORG link : CVE-2016-1566
JSON object : View
Products Affected
apache
- guacamole
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')