Lucene search

K
packetstormNuman OZDEMIRPACKETSTORM:149898
HistoryOct 22, 2018 - 12:00 a.m.

AjentiCP 1.2.23.13 Cross Site Scripting

2018-10-2200:00:00
Numan OZDEMIR
packetstormsecurity.com
29

0.001 Low

EPSS

Percentile

50.2%

`[+] Title: AjentiCP Dir Name Based Stored XSS <= v1.2.23.13  
[+] Author: Numan OZDEMIR (https://infinitumit.com.tr)  
[+] Vendor Homepage: ajenti.org  
[+] Version: Up to v1.2.23.13  
[+] CVE: CVE-2018-18548  
[+] Discovered by Numan OZDEMIR in InfinitumIT Labs  
[+] [email protected] - [email protected]  
  
[~] Description:  
  
Attacker can inject JavaScript codes without Ajenti privileges by this   
vulnerabillity.  
Normally an attacker cant intervene to Ajenti without Ajenti privileges.  
But with this vulnerability, if attacker can create a folder (may be by   
a web app vulnerability) he can run  
bad-purposed JavaScript codes on Ajenti user's browser, while the user   
using File Manager tool.  
So this vulnerability makes high risk.  
  
[~] How to Reproduce:  
1)- Create a directory as named xss payload. Like, im<img src   
onerror=alert(1337)>dir  
2)- Open this directory in File Manager tool in Ajenti server admin   
panel.  
  
// for secure days...  
  
`

0.001 Low

EPSS

Percentile

50.2%