Cybele Thinfinity VirtualUI 2.5.17.2 allows HTTP response splitting via the mimetype parameter within a PDF viewer request, as demonstrated by an example.pdf?mimetype= substring. The victim user must load an application request to view a PDF, containing the malicious payload. This results in a reflected XSS payload being executed.
References
Link | Resource |
---|---|
https://labs.nettitude.com/blog/cve-2019-16384-85-cyblesoft-thinfinity-virtualui-path-traversal-http-header-injection/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-06-04T15:29:35
Updated: 2020-06-04T15:29:35
Reserved: 2019-09-17T00:00:00
Link: CVE-2019-16385
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-06-04T16:15:11.890
Modified: 2021-07-21T11:39:23.747
Link: CVE-2019-16385
JSON object: View
Redhat Information
No data.