Leostream Connection Broker 8.2.x is affected by stored XSS. An unauthenticated attacker can inject arbitrary JavaScript code via the webquery.pl User-Agent HTTP header. It is rendered by the admins the next time they log in. The JavaScript injected can be used to force the admin to upload a malicious Perl script that will be executed as root via libMisc::browser_client. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T15:56:04.982Z
Reserved: 2020-10-06T00:00:00
Link: CVE-2020-26574
No data.
Status : Modified
Published: 2020-10-06T15:15:15.490
Modified: 2024-11-21T05:20:06.693
Link: CVE-2020-26574
No data.
OpenCVE Enrichment
No data.
Weaknesses