{"packetstorm": [{"lastseen": "2018-11-05T18:19:57", "description": "", "cvss3": {}, "published": "2018-11-02T00:00:00", "type": "packetstorm", "title": "Loadbalancer.org Enterprise VA MAX Cross Site Scripting", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2018-18864"], "modified": "2018-11-02T00:00:00", "id": "PACKETSTORM:150135", "href": "https://packetstormsecurity.com/files/150135/Loadbalancer.org-Enterprise-VA-MAX-Cross-Site-Scripting.html", "sourceData": "`Title: Loadbalancer.org Enterprise VA MAX - Unauthenticated Stored XSS \nAuthor: Jakub Palaczynski \nDate: 24. July 2018 \nCVE: CVE-2018-18864 \n \nAffected product: \n============= \n \nLoadbalancer.org Enterprise VA MAX before 8.3.3 \n \nImpact: \n====== \nRemote Code Execution with root privileges. \n \n \nVulnerability - Unauthenticated Stored XSS: \n=================================== \n \nTwo instances of Unauthenticated Stored XSS issue were identified in \nLoadbalancer.org Enterprise VA MAX: \n \n1. Application takes input from Basic Auth (username) and stores it without \nany validation in \"Apache Error Log\". \nThis instance works only on HTTPS port. \n \n2. It is possible to inject custom JavaScript code by accessing URL like \n/?<XSS>. \nSuch JavaScript is stored in \"Apache User Log\". \nIt works on both - HTTP and HTTPS ports. \n \nContact: \n======== \n \nJakub[dot]Palaczynski[at]gmail[dot]com \n \n \n`\n", "cvss": {"score": 0.0, "vector": "NONE"}, "sourceHref": "https://packetstormsecurity.com/files/download/150135/lbevm-xss.txt"}]}