Reflected XSS in Medintux v2.16.000 CCAM.php by manipulating the mot1 parameter can result in an attacker performing malicious actions to users who open a maliciously crafted link or third-party web page.
References
Link | Resource |
---|---|
https://github.com/EmreOvunc/Medintux-V2.16.000-Reflected-XSS-Vulnerability | Exploit Third Party Advisory |
https://emreovunc.com/blog/en/Medintux-v2.16.000-Reflected-XSS-02.png | Third Party Advisory |
https://emreovunc.com/blog/en/Medintux-v2.16.000-Reflected-XSS-01.png | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-01-19 17:15
Updated : 2021-01-22 11:47
NVD link : CVE-2020-19361
Mitre link : CVE-2020-19361
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
medintux
- medintux