Xavier PHP Management Panel 3.0 is vulnerable to Reflected POST-based XSS via the username parameter when registering a new user at admin/includes/adminprocess.php. If there is an error when registering the user, the unsanitized username will reflect via the error page. Due to the lack of CSRF protection on the admin/includes/adminprocess.php endpoint, an attacker is able to chain the XSS with CSRF in order to cause remote exploitation.
References
Link | Resource |
---|---|
https://codecanyon.net/item/xavier-php-login-script-user-management/9146226 | Product |
https://m-q-t.github.io/notes/xavier-csrf-to-xss-takeover/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-26T12:35:46
Updated: 2019-07-26T12:35:46
Reserved: 2019-07-21T00:00:00
Link: CVE-2019-14228
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-07-26T13:15:12.957
Modified: 2020-08-24T17:37:01.140
Link: CVE-2019-14228
JSON object: View
Redhat Information
No data.