Описание
There is a stored XSS in Rambox 0.6.9 that can lead to code execution. The XSS is in the name field while adding/editing a service. The problem occurs due to incorrect sanitization of the name field when being processed and stored. This allows a user to craft a payload for Node.js and Electron, such as an exec of OS commands within the onerror attribute of an IMG element.
Ссылки
- ExploitIssue TrackingThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:rambox:rambox:0.6.9:*:*:*:community:*:*:*
EPSS
Процентиль: 89%
0.05057
Низкий
9 Critical
CVSS3
8.5 High
CVSS2
Дефекты
CWE-78
Связанные уязвимости
EPSS
Процентиль: 89%
0.05057
Низкий
9 Critical
CVSS3
8.5 High
CVSS2
Дефекты
CWE-78