Revive Adserver before 3.2.3 suffers from persistent XSS. Usernames are not properly escaped when displayed in the audit trail widget of the dashboard upon login, allowing persistent XSS attacks. An authenticated user with enough privileges to create other users could exploit the vulnerability to access the administrator account.
References
Link | Resource |
---|---|
https://github.com/revive-adserver/revive-adserver/commit/8d8c6df309ff5fde9dd4770abcd4ec5d2449b3ec | Issue Tracking Patch Third Party Advisory |
https://hackerone.com/reports/97073 | Permissions Required |
https://www.revive-adserver.com/security/revive-sa-2016-001/ | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: hackerone
Published: 2017-03-28T02:46:00
Updated: 2017-03-28T02:57:01
Reserved: 2016-10-31T00:00:00
Link: CVE-2016-9126
JSON object: View
NVD Information
Status : Modified
Published: 2017-03-28T02:59:00.417
Modified: 2019-10-09T23:20:18.990
Link: CVE-2016-9126
JSON object: View
Redhat Information
No data.
CWE