PHPipam version 1.3.2 and earlier contains a CWE-79 vulnerability in /app/admin/users/print-user.php that can result in Execute code in the victims browser. This attack appear to be exploitable via Attacker change theme parameter in user settings. Admin(Victim) views user in admin-panel and gets exploited.. This vulnerability appears to have been fixed in 1.4.
References
Link | Resource |
---|---|
https://github.com/phpipam/phpipam/commit/552fbb0fc7ecb84bda4a131b4f290a3de9980040 | Patch Third Party Advisory |
https://github.com/phpipam/phpipam/issues/2326 | Exploit Patch Third Party Advisory |
https://github.com/phpipam/phpipam/commit/552fbb0fc7ecb84bda4a131b4f290a3de9980040 | Patch Third Party Advisory |
https://github.com/phpipam/phpipam/issues/2326 | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/phpipam/phpipam/commit/552fbb0fc7ecb84bda4a131b4f290a3de9980040 - Patch, Third Party Advisory | |
References | () https://github.com/phpipam/phpipam/issues/2326 - Exploit, Patch, Third Party Advisory |
Information
Published : 2018-12-20 17:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000870
Mitre link : CVE-2018-1000870
CVE.ORG link : CVE-2018-1000870
JSON object : View
Products Affected
phpipam
- phpipam
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')