An issue was discovered in Jirafeau before 3.4.1. The "search file by hash" form is affected by reflected XSS that could allow, by targeting an administrator, stealing a session and gaining administrative privileges.
References
Link | Resource |
---|---|
https://www.bishopfox.com/news/2018/06/jirafeau-version-3-3-0-multiple-vulnerabilities/ | Exploit Third Party Advisory |
https://www.bishopfox.com/news/2018/06/jirafeau-version-3-3-0-multiple-vulnerabilities/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.bishopfox.com/news/2018/06/jirafeau-version-3-3-0-multiple-vulnerabilities/ - Exploit, Third Party Advisory |
Information
Published : 2018-07-06 17:29
Updated : 2024-11-21 03:47
NVD link : CVE-2018-13409
Mitre link : CVE-2018-13409
CVE.ORG link : CVE-2018-13409
JSON object : View
Products Affected
jirafeau
- jirafeau
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')