Advertisement






AjentiCP Dir Name Based Stored XSS < = v1.2.23.13

CVE Category Price Severity
CVE-2018-18548 CWE-79 Not specified Medium
Author Risk Exploitation Type Date
Not specified High Remote 2018-10-21
CPE
cpe:cpe:/a:ajenti:ajenti:1.2.23.13
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018100178

Below is a copy:

AjentiCP Dir Name Based Stored XSS <= v1.2.23.13
[+] Title: AjentiCP Dir Name Based Stored XSS <= v1.2.23.13
[+] Author: Numan OZDEMIR (https://infinitumit.com.tr)
[+] Vendor Homepage: ajenti.org
[+] Version: Up to v1.2.23.13
[+] CVE: CVE-2018-18548
[+] Discovered by Numan OZDEMIR in InfinitumIT Labs
[+] [email protected] - [email protected]

[~] Description:

Attacker can inject JavaScript codes without Ajenti privileges by this vulnerabillity.
Normally an attacker cant intervene to Ajenti without Ajenti privileges.
But with this vulnerability, if attacker can create a folder (may be by a web app vulnerability) he can run
bad-purposed JavaScript codes on Ajenti user's browser, while the user using File Manager tool. 
So this vulnerability makes high risk.

[~] How to Reproduce:
1)- Create a directory as named xss payload. Like, im<img src onerror=alert(1337)>dir
2)- Open this directory in File Manager tool in Ajenti server admin panel.

// for secure days...


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum