Impact
The User Agent value is stored in the active session file, and is output directly onto the page without any form of validation or sanitation. An attacker can exploit this vulnerability by inserting a payload after the user agent header value that contains malicious code or script. This code will then be executed when the page is loaded in the browser of a victim who has an active session with this code stored in their session.
Patches
The vulnerability was fixed in version 5.10.4.
Impact
The User Agent value is stored in the active session file, and is output directly onto the page without any form of validation or sanitation. An attacker can exploit this vulnerability by inserting a payload after the user agent header value that contains malicious code or script. This code will then be executed when the page is loaded in the browser of a victim who has an active session with this code stored in their session.
Patches
The vulnerability was fixed in version 5.10.4.