GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "Menu Link" parameter, aka the adm/menu_list_update.php me_link parameter.
References
Link | Resource |
---|---|
https://github.com/gnuboard/gnuboard5/commit/a45241f4bc46aee1ab2cc0749f6444b043681edf#diff-bf0e19438d64230c1541bcbf9746e6e5 | Patch Third Party Advisory |
https://github.com/gnuboard/gnuboard5/compare/15b2e73...2549172 | Patch Third Party Advisory |
https://github.com/gnuboard/gnuboard5/releases/tag/5.3.2.0 | Release Notes Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-23T15:48:11
Updated: 2019-07-23T15:48:10
Reserved: 2018-10-26T00:00:00
Link: CVE-2018-18673
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-07-23T16:15:11.007
Modified: 2019-07-25T15:38:22.723
Link: CVE-2018-18673
JSON object: View
Redhat Information
No data.
CWE