An issue was discovered in the image-manager in Xoops 2.5.10. When any image with a JavaScript payload as its name is hovered over in the list or in the Edit page, the payload executes.
References
Link | Resource |
---|---|
https://blog.nirajkhatiwada.com.np/cve-2019-16684-stored-cross-site-scripting/ | Exploit Third Party Advisory |
https://github.com/XOOPS/XoopsCore25/commits/master | Patch Third Party Advisory |
https://xoops.org/modules/publisher/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-09-30T15:28:03
Updated: 2019-09-30T15:28:03
Reserved: 2019-09-22T00:00:00
Link: CVE-2019-16684
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-09-30T16:15:11.227
Modified: 2019-10-04T16:33:04.597
Link: CVE-2019-16684
JSON object: View
Redhat Information
No data.
CWE