An issue was discovered in Rumpus 8.2.10 on macOS. By crafting a directory name, it is possible to activate JavaScript in the context of the web application after invoking the rename folder functionality.
References
Link | Resource |
---|---|
https://pastebin.com/3YdFZCKe | Exploit Third Party Advisory |
https://www.maxum.com/Rumpus/Download.html | Product |
https://pastebin.com/3YdFZCKe | Exploit Third Party Advisory |
https://www.maxum.com/Rumpus/Download.html | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://pastebin.com/3YdFZCKe - Exploit, Third Party Advisory | |
References | () https://www.maxum.com/Rumpus/Download.html - Product |
Information
Published : 2020-02-02 15:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-8514
Mitre link : CVE-2020-8514
CVE.ORG link : CVE-2020-8514
JSON object : View
Products Affected
apple
- macos
maxum
- rumpus
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')