CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.793 (Free/Open Source Version) and 0.9.8.753 (Pro) is vulnerable to Stored/Persistent XSS for Admin Email fields on the "CWP Settings > "Edit Settings" screen. By changing the email ID to any XSS Payload and clicking on Save Changes, the XSS Payload will execute.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://forum.centos-webpanel.com/informations/ - Vendor Advisory | |
References | () http://packetstormsecurity.com/files/152437/CentOS-Web-Panel-0.9.8.793-Free-0.9.8.753-Pro-Cross-Site-Scripting.html - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/108035 - Third Party Advisory, VDB Entry | |
References | () https://packetstormsecurity.com/files/152437/centoswp098email-xss.txt - Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/46669 - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/46669/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-04-18 20:29
Updated : 2024-11-21 04:20
NVD link : CVE-2019-10893
Mitre link : CVE-2019-10893
CVE.ORG link : CVE-2019-10893
JSON object : View
Products Affected
centos-webpanel
- centos_web_panel
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')