Versiant LYNX Customer Service Portal (CSP), version 3.5.2, is vulnerable to stored cross-site scripting, which could allow a local, authenticated attacker to insert malicious JavaScript that is stored and displayed to the end user. This could lead to website redirects, session cookie hijacking, or information disclosure.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-29884 | Versiant LYNX Customer Service Portal (CSP), version 3.5.2, is vulnerable to stored cross-site scripting, which could allow a local, authenticated attacker to insert malicious JavaScript that is stored and displayed to the end user. This could lead to website redirects, session cookie hijacking, or information disclosure. |
Fixes
Solution
This vulnerability has been patched in version 3.5.3 of Versiant LYNX Customer Service Portal. Customers should log into the Lynx customer portal to obtain the latest version, found at https://csp.poha.com/lynx/.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://csp.poha.com/lynx/ |
|
| https://kb.cert.org/vuls/id/962085/ |
|
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-09-16T16:47:42.042Z
Reserved: 2020-02-18T00:00:00
Link: CVE-2020-9055
No data.
Status : Modified
Published: 2020-03-30T22:15:15.667
Modified: 2024-11-21T05:39:55.287
Link: CVE-2020-9055
No data.
OpenCVE Enrichment
No data.
EUVD