Описание
Cybele Thinfinity VirtualUI 2.5.17.2 allows HTTP response splitting via the mimetype parameter within a PDF viewer request, as demonstrated by an example.pdf?mimetype= substring. The victim user must load an application request to view a PDF, containing the malicious payload. This results in a reflected XSS payload being executed.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.5.17.2 (включая)
cpe:2.3:a:cybelesoft:thinfinity_virtualui:*:*:*:*:*:*:*:*
EPSS
Процентиль: 52%
0.00288
Низкий
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-74
Связанные уязвимости
github
больше 3 лет назад
Cybele Thinfinity VirtualUI 2.5.17.2 allows HTTP response splitting via the mimetype parameter within a PDF viewer request, as demonstrated by an example.pdf?mimetype= substring. The victim user must load an application request to view a PDF, containing the malicious payload. This results in a reflected XSS payload being executed.
EPSS
Процентиль: 52%
0.00288
Низкий
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-74