Progress Sitefinity 9.1 has XSS via file upload, because JavaScript code in an HTML file has the same origin as the application's own code. This is fixed in 10.1.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html | Exploit Third Party Advisory VDB Entry |
https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-progress-sitefinity/index.html | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html | Exploit Third Party Advisory VDB Entry |
https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-progress-sitefinity/index.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-progress-sitefinity/index.html - Exploit, Third Party Advisory |
Information
Published : 2018-02-12 14:29
Updated : 2024-11-21 03:19
NVD link : CVE-2017-18176
Mitre link : CVE-2017-18176
CVE.ORG link : CVE-2017-18176
JSON object : View
Products Affected
progress
- sitefinity
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')