Description
P5 FNIP-8x16A/FNIP-4xSH versions 1.0.20 and 1.0.11 suffer from a stored cross-site scripting vulnerability. Input passed to several GET/POST parameters is not properly sanitized before being returned to the user, allowing attackers to execute arbitrary HTML and script code in a user's browser session in the context of the affected site. This can be exploited by submitting crafted input to the label modification functionality, such as the 'lab4' parameter in config.html.
Problem types
Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)
Product status
1.0.11
Credits
Gjoko 'LiquidWorm' Krstic (@zeroscience)
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5564.php (Zero Science Lab Disclosure (ZSL-2020-5564))
www.exploit-db.com/exploits/48362 (ExploitDB-48362)
packetstormsecurity.com/...6A-FNIP-4xSH-1.0.20-CSRF-XSS.html (Packet Storm Entry)
exchange.xforce.ibmcloud.com/vulnerabilities/176993 (IBM X-Force Vulnerability Report)
www.p5.hu/ (P5 Vendor Homepage)
www.vulncheck.com/...nip-xsh-stored-cross-site-scripting-xss (VulnCheck Advisory: P5 FNIP-8x16A/FNIP-4xSH 1.0.20, 1.0.11 - Stored Cross-Site Scripting (XSS))