Reflected XSS in Medintux v2.16.000 CCAM.php by manipulating the mot1 parameter can result in an attacker performing malicious actions to users who open a maliciously crafted link or third-party web page.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/EmreOvunc/Medintux-V2.16.000-Reflected-XSS-Vulnerability | third party advisory exploit |
https://emreovunc.com/blog/en/Medintux-v2.16.000-Reflected-XSS-02.png | third party advisory |
https://emreovunc.com/blog/en/Medintux-v2.16.000-Reflected-XSS-01.png | third party advisory exploit |