Froxlor through 0.10.22 does not perform validation on user input passed in the customermail GET parameter. The value of this parameter is reflected in the login webpage, allowing the injection of arbitrary HTML tags.
References
Link | Resource |
---|---|
https://github.com/Froxlor/Froxlor/commits/master | Patch Third Party Advisory |
https://github.com/Froxlor/Froxlor/security/advisories | Not Applicable Third Party Advisory |
https://nozero.io/en/cve-2020-29653-froxlor-html-injection-dangling-markup/ | Exploit Third Party Advisory |
https://github.com/Froxlor/Froxlor/commits/master | Patch Third Party Advisory |
https://github.com/Froxlor/Froxlor/security/advisories | Not Applicable Third Party Advisory |
https://nozero.io/en/cve-2020-29653-froxlor-html-injection-dangling-markup/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Froxlor/Froxlor/commits/master - Patch, Third Party Advisory | |
References | () https://github.com/Froxlor/Froxlor/security/advisories - Not Applicable, Third Party Advisory | |
References | () https://nozero.io/en/cve-2020-29653-froxlor-html-injection-dangling-markup/ - Exploit, Third Party Advisory |
Information
Published : 2022-04-13 13:15
Updated : 2024-11-21 05:24
NVD link : CVE-2020-29653
Mitre link : CVE-2020-29653
CVE.ORG link : CVE-2020-29653
JSON object : View
Products Affected
froxlor
- froxlor
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')