In userman 13.0.76.43 through 15.0.20 in Sangoma FreePBX, XSS exists in the user management screen of the Administrator web site, i.e., the/admin/config.php?display=userman URI. An attacker with sufficient privileges can edit the Display Name of a user and embed malicious XSS code. When another user (such as an admin) visits the main User Management screen, the XSS payload will render and execute in the context of the victim user's account.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-9170 In userman 13.0.76.43 through 15.0.20 in Sangoma FreePBX, XSS exists in the user management screen of the Administrator web site, i.e., the/admin/config.php?display=userman URI. An attacker with sufficient privileges can edit the Display Name of a user and embed malicious XSS code. When another user (such as an admin) visits the main User Management screen, the XSS payload will render and execute in the context of the victim user's account.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T02:16:48.089Z

Reserved: 2019-12-04T00:00:00

Link: CVE-2019-19552

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-12-06T16:15:11.107

Modified: 2024-11-21T04:34:57.273

Link: CVE-2019-19552

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.