CVE-2019-14228

Xavier PHP Management Panel 3.0 is vulnerable to Reflected POST-based XSS via the username parameter when registering a new user at admin/includes/adminprocess.php. If there is an error when registering the user, the unsanitized username will reflect via the error page. Due to the lack of CSRF protection on the admin/includes/adminprocess.php endpoint, an attacker is able to chain the XSS with CSRF in order to cause remote exploitation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:angry-frog:xavier:3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:26

Type Values Removed Values Added
References () https://codecanyon.net/item/xavier-php-login-script-user-management/9146226 - Product () https://codecanyon.net/item/xavier-php-login-script-user-management/9146226 - Product
References () https://m-q-t.github.io/notes/xavier-csrf-to-xss-takeover/ - Exploit, Third Party Advisory () https://m-q-t.github.io/notes/xavier-csrf-to-xss-takeover/ - Exploit, Third Party Advisory

Information

Published : 2019-07-26 13:15

Updated : 2024-11-21 04:26


NVD link : CVE-2019-14228

Mitre link : CVE-2019-14228

CVE.ORG link : CVE-2019-14228


JSON object : View

Products Affected

angry-frog

  • xavier
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-352

Cross-Site Request Forgery (CSRF)