[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: [FD] =?utf-8?q?Centraleyezer=3A_Stored_XSS_using_HTML_Entities_?= =?utf-8?b?4oCUIFtDVkUtMjAxOeKAkzEy
From: infinitybuzz via Fulldisclosure <fulldisclosure () seclists ! org>
Date: 2019-11-12 16:40:43
Message-ID: xd90kL14IjY3eg_rVj54r5JwH9y-v8akwbp6EZ3XfQ8a_lEjSUQlOgk5C4xSd0zTH1QfiTmohtpfuTD7i-K9IAa9AmCI4UqVqNUatW8E3m8= () protonmail ! com
[Download RAW message or body]
Centraleyezer: Stored XSS using HTML Entities — [CVE-2019–12299]
Sandline Centraleyezer (On Premises) allows Stored XSS using HTML entities in the name field of \
the Category section.
I could bypass the restrictions using HTML Entities > <, the Stored XSS only triggers when \
editing the category.
More Information:
https://link.medium.com/5galrOpMy1
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic