Multiple cross-site scripting (XSS) vulnerabilities in Quali CloudShell before 8 allow remote authenticated users to inject arbitrary web script or HTML via the (1) Name or (2) Description parameter to RM/Reservation/ReserveNew; the (3) Description parameter to RM/Topology/Update; the (4) Name, (5) Description, (6) ExecutionBatches[0].Name, (7) ExecutionBatches[0].Description, or (8) Labels parameter to SnQ/JobTemplate/Edit; or (9) Alias or (10) Description parameter to RM/AbstractTemplate/AddOrUpdateAbstractTemplate.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/143746/Quali-CloudShell-7.1.0.6508-Patch-6-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/541023/100/0/threaded | |
https://www.exploit-db.com/exploits/42453/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2017-08-18 16:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-9767
Mitre link : CVE-2017-9767
CVE.ORG link : CVE-2017-9767
JSON object : View
Products Affected
quali
- cloudshell
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')