There is a stored XSS in Rambox 0.6.9 that can lead to code execution. The XSS is in the name field while adding/editing a service. The problem occurs due to incorrect sanitization of the name field when being processed and stored. This allows a user to craft a payload for Node.js and Electron, such as an exec of OS commands within the onerror attribute of an IMG element.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T01:47:13.423Z

Reserved: 2019-10-16T00:00:00

Link: CVE-2019-17625

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-16T12:15:11.947

Modified: 2024-11-21T04:32:39.220

Link: CVE-2019-17625

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.