The Discuss v1.2.1 module in Claromentis 8.2.2 is vulnerable to stored Cross Site Scripting (XSS). An authenticated attacker will be able to place malicious JavaScript in the discussion forum, which is present in the login landing page. A low privilege user can use this to steal the session cookies from high privilege accounts and hijack these, enabling them to hijack the elevated session and perform actions in their security context.
References
Link | Resource |
---|---|
https://seclists.org/fulldisclosure/2018/Oct/12 | Exploit Mailing List Third Party Advisory |
https://seclists.org/fulldisclosure/2018/Oct/12 | Exploit Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 03:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://seclists.org/fulldisclosure/2018/Oct/12 - Exploit, Mailing List, Third Party Advisory |
Information
Published : 2018-10-08 17:29
Updated : 2024-11-21 03:51
NVD link : CVE-2018-15903
Mitre link : CVE-2018-15903
CVE.ORG link : CVE-2018-15903
JSON object : View
Products Affected
claromentis
- claromentis
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')