Description
IPFire 2.21 Core Update 127 contains a reflected cross-site scripting vulnerability in the updatexlrator.cgi script that allows attackers to inject malicious scripts through POST parameters. Attackers can submit crafted requests with script payloads in the MAX_DISK_USAGE or MAX_DOWNLOAD_RATE parameters to execute arbitrary JavaScript in users' browsers.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
Ozer Goker
References
www.exploit-db.com/exploits/46344 (ExploitDB-46344)
www.ipfire.org (IPFire Official Website)
downloads.ipfire.org/.../ipfire-2.21.x86_64-full-core127.iso (IPFire 2.21 Core Update 127 Download)
www.vulncheck.com/...-update-reflected-xss-via-updatexlrator (VulnCheck Advisory: IPFire 2.21 Core Update 127 Reflected XSS via updatexlrator.cgi)