Lucene search

K
prionPRIOn knowledge basePRION:CVE-2017-5990
HistoryFeb 15, 2017 - 6:59 a.m.

Authorization

2017-02-1506:59:00
PRIOn knowledge base
www.prio-n.com
1

6.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.8%

An issue was discovered in PhreeBooksERP before 2017-02-13. The vulnerability exists due to insufficient filtration of user-supplied data in the “form” HTTP GET parameter passed to the “PhreeBooksERP-master/extensions/ShippingMethods/ups/label_mgr/js_include.php” and “PhreeBooksERP-master/extensions/ShippingMethods/yrc/label_mgr/js_include.php” URLs. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. NOTE: these js_include.php files do not exist in the SourceForge “stable release” (aka R37RC1).

CPENameOperatorVersion
phreebookserpeq<= 2016123

6.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.8%

Related for PRION:CVE-2017-5990