CVE-2020-23014

APfell 1.4 is vulnerable to authenticated reflected cross-site scripting (XSS) in /apiui/command_ through the payloadtypes_callback function, which allows an attacker to steal remote admin/user session and/or adding new users to the administration panel.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apfell_project:apfell:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:13

Type Values Removed Values Added
References () https://github.com/its-a-feature/Apfell/commit/5fc64502bc008388514f2b5d1160b677e3b4a7f3 - Patch, Third Party Advisory () https://github.com/its-a-feature/Apfell/commit/5fc64502bc008388514f2b5d1160b677e3b4a7f3 - Patch, Third Party Advisory
References () https://seekurity.com/blog/2020/04/19/admin/advisories/apfell-post-exploitation-red-team-framework-authenticated-cross-site-scripting-vulnerability - Exploit, Third Party Advisory () https://seekurity.com/blog/2020/04/19/admin/advisories/apfell-post-exploitation-red-team-framework-authenticated-cross-site-scripting-vulnerability - Exploit, Third Party Advisory

Information

Published : 2021-01-26 18:15

Updated : 2024-11-21 05:13


NVD link : CVE-2020-23014

Mitre link : CVE-2020-23014

CVE.ORG link : CVE-2020-23014


JSON object : View

Products Affected

apfell_project

  • apfell
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')