Vulnerability Description
An issue was discovered in MunkiReport before 5.3.0. An authenticated actor can send a custom XSS payload through the /module/comment/save endpoint. The payload will be executed by any authenticated users browsing the application. This concerns app/controllers/client.php:detail.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Munkireport Project | Munkireport | >= 2.5.3, < 5.3.0 |
Related Weaknesses (CWE)
References
- https://github.com/munkireport/munkireport-php/releasesThird Party Advisory
- https://github.com/munkireport/munkireport-php/wiki/20200309-Authenticated-CommeExploitThird Party Advisory
- https://github.com/munkireport/munkireport-php/releasesThird Party Advisory
- https://github.com/munkireport/munkireport-php/wiki/20200309-Authenticated-CommeExploitThird Party Advisory
FAQ
What is CVE-2020-10191?
CVE-2020-10191 is a vulnerability with a CVSS score of 5.4 (MEDIUM). An issue was discovered in MunkiReport before 5.3.0. An authenticated actor can send a custom XSS payload through the /module/comment/save endpoint. The payload will be executed by any authenticated u...
How severe is CVE-2020-10191?
CVE-2020-10191 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-10191?
Check the references section above for vendor advisories and patch information. Affected products include: Munkireport Project Munkireport.