paintballrefjosh/MaNGOSWebV4 before 4.0.8 is vulnerable to a reflected XSS in install/index.php (step parameter).
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/96584 | vdb entry third party advisory |
https://github.com/paintballrefjosh/MaNGOSWebV4/issues/15 | exploit patch vendor advisory |
https://github.com/paintballrefjosh/MaNGOSWebV4/releases/tag/4.0.8 | release notes patch vendor advisory |