easymon version 1.4 and earlier contains a Cross Site Scripting (XSS) vulnerability in Endpoint where monitoring is mounted that can result in Reflected XSS that affects Firefox. Can be used to steal cookies, depending on the cookie settings.. This attack appear to be exploitable via The victim must click on a crafted URL that contains the XSS payload. This vulnerability appears to have been fixed in 1.4.1 and later.
References
Link | Resource |
---|---|
https://github.com/basecamp/easymon/issues/26 | Patch Third Party Advisory |
https://github.com/basecamp/easymon/pull/25 | Patch Third Party Advisory |
https://github.com/basecamp/easymon/issues/26 | Patch Third Party Advisory |
https://github.com/basecamp/easymon/pull/25 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/basecamp/easymon/issues/26 - Patch, Third Party Advisory | |
References | () https://github.com/basecamp/easymon/pull/25 - Patch, Third Party Advisory |
Information
Published : 2018-12-20 17:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000855
Mitre link : CVE-2018-1000855
CVE.ORG link : CVE-2018-1000855
JSON object : View
Products Affected
basecamp
- easymon
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')