Mautic before 3.2.4 is affected by stored XSS. An attacker with permission to manage companies, an application feature, could attack other users, including administrators. For example, by loading an externally crafted JavaScript file, an attacker could eventually perform actions as the target user. These actions include changing the user passwords, altering user or email addresses, or adding a new administrator to the system.
References
Link | Resource |
---|---|
https://forum.mautic.org/c/announcements/16 | Vendor Advisory |
https://forum.mautic.org/t/security-release-for-all-versions-of-mautic-prior-to-2-16-5-and-3-2-4/17786 | Exploit Vendor Advisory |
https://labs.bishopfox.com/advisories/mautic-version-3.2.2 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-01-19T13:08:02
Updated: 2021-02-22T02:31:43
Reserved: 2020-12-11T00:00:00
Link: CVE-2020-35128
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-01-19T14:15:12.153
Modified: 2021-02-24T20:22:50.417
Link: CVE-2020-35128
JSON object: View
Redhat Information
No data.
CWE