| ID |
CVE-2020-11106
|
| Sažetak |
An issue was discovered in Responsive Filemanager through 9.14.0. In the dialog.php page, the session variable $_SESSION['RF']["view_type"] wasn't sanitized if it was already set. This made stored XSS possible if one opens ajax_calls.php and uses the "view" action and places a payload in the type parameter, and then returns to the dialog.php page. This occurs because ajax_calls.php was also able to set the $_SESSION['RF']["view_type"] variable, but there it wasn't sanitized. |
| Reference |
|
| CVSS |
| Base: | 4.3 |
| Impact: | 2.9 |
| Exploitability: | 8.6 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
MEDIUM |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| NONE |
PARTIAL |
NONE |
|
| CVSS vektor |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
| Zadnje važnije ažuriranje |
01-04-2020 - 17:12 |
| Objavljeno |
30-03-2020 - 22:15 |