Vulnerability Details : CVE-2018-1000870
Potential exploit
PHPipam version 1.3.2 and earlier contains a CWE-79 vulnerability in /app/admin/users/print-user.php that can result in Execute code in the victims browser. This attack appear to be exploitable via Attacker change theme parameter in user settings. Admin(Victim) views user in admin-panel and gets exploited.. This vulnerability appears to have been fixed in 1.4.
Vulnerability category: Cross site scripting (XSS)Execute code
Products affected by CVE-2018-1000870
- cpe:2.3:a:phpipam:phpipam:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-1000870
0.34%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 54 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-1000870
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:P/A:N |
6.8
|
2.9
|
NIST | |
5.4
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
2.3
|
2.7
|
NIST |
CWE ids for CVE-2018-1000870
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-1000870
-
https://github.com/phpipam/phpipam/commit/552fbb0fc7ecb84bda4a131b4f290a3de9980040
Bugfix: XSS in print-user.php, CSRF in user-edit.php. Fixes #2326 · phpipam/phpipam@552fbb0 · GitHubPatch;Third Party Advisory
-
https://github.com/phpipam/phpipam/issues/2326
XSS (Stored) in /app/admin/users/print-user.php (CSRF too: /app/tools/user-menu/user-edit.php) · Issue #2326 · phpipam/phpipam · GitHubExploit;Patch;Third Party Advisory
Jump to