ajenticp (aka Ajenti Docker control panel) for Ajenti through v1.2.23.13 has XSS via a filename that is mishandled in File Manager.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/149898/AjentiCP-1.2.23.13-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
https://numanozdemir.com/ajenti-xss.txt | Third Party Advisory |
https://www.exploit-db.com/exploits/45691/ | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/149898/AjentiCP-1.2.23.13-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
https://numanozdemir.com/ajenti-xss.txt | Third Party Advisory |
https://www.exploit-db.com/exploits/45691/ | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/149898/AjentiCP-1.2.23.13-Cross-Site-Scripting.html - Third Party Advisory, VDB Entry | |
References | () https://numanozdemir.com/ajenti-xss.txt - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/45691/ - Third Party Advisory, VDB Entry |
Information
Published : 2018-10-24 21:29
Updated : 2024-11-21 03:56
NVD link : CVE-2018-18548
Mitre link : CVE-2018-18548
CVE.ORG link : CVE-2018-18548
JSON object : View
Products Affected
ajenti
- ajenticp
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')