Vulnerability Description
paintballrefjosh/MaNGOSWebV4 before 4.0.8 is vulnerable to a reflected XSS in install/index.php (step parameter).
CVSS Score
6.1
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mangoswebv4 Project | Mangoswebv4 | < 4.0.8 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/96584Third Party AdvisoryVDB Entry
- https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2017-6478.md
- https://github.com/paintballrefjosh/MaNGOSWebV4/issues/15ExploitPatchVendor Advisory
- https://github.com/paintballrefjosh/MaNGOSWebV4/releases/tag/4.0.8PatchRelease NotesVendor Advisory
- http://www.securityfocus.com/bid/96584Third Party AdvisoryVDB Entry
- https://github.com/paintballrefjosh/MaNGOSWebV4/issues/15ExploitPatchVendor Advisory
- https://github.com/paintballrefjosh/MaNGOSWebV4/releases/tag/4.0.8PatchRelease NotesVendor Advisory
FAQ
What is CVE-2017-6478?
CVE-2017-6478 is a vulnerability with a CVSS score of 6.1 (MEDIUM). paintballrefjosh/MaNGOSWebV4 before 4.0.8 is vulnerable to a reflected XSS in install/index.php (step parameter).
How severe is CVE-2017-6478?
CVE-2017-6478 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-6478?
Check the references section above for vendor advisories and patch information. Affected products include: Mangoswebv4 Project Mangoswebv4.