Vulnerability Description
IPFire 2.21 Core Update 127 contains a reflected cross-site scripting vulnerability in the updatexlrator.cgi script that allows attackers to inject malicious scripts through POST parameters. Attackers can submit crafted requests with script payloads in the MAX_DISK_USAGE or MAX_DOWNLOAD_RATE parameters to execute arbitrary JavaScript in users' browsers.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ipfire | Ipfire | 2.21 |
Related Weaknesses (CWE)
References
- https://downloads.ipfire.org/releases/ipfire-2.x/2.21-core127/ipfire-2.21.x86_64Product
- https://www.exploit-db.com/exploits/46344ExploitThird Party AdvisoryVDB Entry
- https://www.ipfire.orgProduct
- https://www.vulncheck.com/advisories/ipfire-core-update-reflected-xss-via-updateBroken LinkThird Party Advisory
FAQ
What is CVE-2019-25396?
CVE-2019-25396 is a vulnerability with a CVSS score of 6.1 (MEDIUM). IPFire 2.21 Core Update 127 contains a reflected cross-site scripting vulnerability in the updatexlrator.cgi script that allows attackers to inject malicious scripts through POST parameters. Attackers...
How severe is CVE-2019-25396?
CVE-2019-25396 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-25396?
Check the references section above for vendor advisories and patch information. Affected products include: Ipfire Ipfire.