FUDForum 3.0.9 is vulnerable to Stored XSS via the User-Agent HTTP header. This may result in remote code execution. An attacker can use a user account to fully compromise the system via a GET request. When the admin visits user information under "User Manager" in the control panel, the payload will execute. This will allow for PHP files to be written to the web root, and for code to execute on the remote server. The problem is in admsession.php and admuser.php.
References
Link | Resource |
---|---|
https://github.com/fuzzlove/FUDforum-XSS-RCE | Exploit Third Party Advisory |
https://sourceforge.net/p/fudforum/code/6321/ | Third Party Advisory |
https://github.com/fuzzlove/FUDforum-XSS-RCE | Exploit Third Party Advisory |
https://sourceforge.net/p/fudforum/code/6321/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/fuzzlove/FUDforum-XSS-RCE - Exploit, Third Party Advisory | |
References | () https://sourceforge.net/p/fudforum/code/6321/ - Third Party Advisory |
Information
Published : 2019-11-12 02:15
Updated : 2024-11-21 04:33
NVD link : CVE-2019-18873
Mitre link : CVE-2019-18873
CVE.ORG link : CVE-2019-18873
JSON object : View
Products Affected
fudforum
- fudforum