Impact
XSS attack (leading to JS execution) when editing the URL parameter.
Patches
Do not use export.php, that is highly deprecated and will be removed in 3.3.
Use export-v2.php
References
- Combodo N°8356 - [SECU] Reflected XSS in webservices/export.php
Credits
Thanks to Joran Lereec (Excube Cybersecurity)
For more information
If you have any questions or comments about this advisory:
Email us at itop-security@combodo.com
Impact
XSS attack (leading to JS execution) when editing the URL parameter.
Patches
Do not use export.php, that is highly deprecated and will be removed in 3.3.
Use export-v2.php
References
Credits
Thanks to Joran Lereec (Excube Cybersecurity)
For more information
If you have any questions or comments about this advisory:
Email us at itop-security@combodo.com