Vulnerability Description
wg7.php in Webgalamb 7.0 makes opportunistic calls to htmlspecialchars() instead of using a templating engine with proper contextual encoding. Because it is possible to insert arbitrary strings into the database, any JavaScript could be executed by the administrator, leading to XSS.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ens | Webgalamb | 7.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSSExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2019/Jan/15ExploitMailing ListThird Party Advisory
- http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSSExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2019/Jan/15ExploitMailing ListThird Party Advisory
FAQ
What is CVE-2018-19509?
CVE-2018-19509 is a vulnerability with a CVSS score of 6.1 (MEDIUM). wg7.php in Webgalamb 7.0 makes opportunistic calls to htmlspecialchars() instead of using a templating engine with proper contextual encoding. Because it is possible to insert arbitrary strings into t...
How severe is CVE-2018-19509?
CVE-2018-19509 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-19509?
Check the references section above for vendor advisories and patch information. Affected products include: Ens Webgalamb.