Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
NameCVE-2019-10893First vendor Publication2019-04-18
VendorCveLast vendor Modification2019-05-02

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:S/C:N/I:P/A:N)
Cvss Base Score3.5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score6.8AuthenticationRequires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.793 (Free/Open Source Version) and 0.9.8.753 (Pro) is vulnerable to Stored/Persistent XSS for Admin Email fields on the "CWP Settings > "Edit Settings" screen. By changing the email ID to any XSS Payload and clicking on Save Changes, the XSS Payload will execute.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10893

CWE : Common Weakness Enumeration

%idName
100 %CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Os2

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/108035
EXPLOIT-DB https://www.exploit-db.com/exploits/46669
https://www.exploit-db.com/exploits/46669/
MISC http://forum.centos-webpanel.com/informations/
http://packetstormsecurity.com/files/152437/CentOS-Web-Panel-0.9.8.793-Free-0...
https://packetstormsecurity.com/files/152437/centoswp098email-xss.txt

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
DateInformations
2019-05-02 21:19:23
  • Multiple Updates
2019-05-02 09:19:05
  • Multiple Updates
2019-04-26 00:19:21
  • Multiple Updates
2019-04-23 21:19:17
  • Multiple Updates
2019-04-20 00:19:10
  • Multiple Updates
2019-04-19 05:18:06
  • First insertion