9
CVSSv3

CVE-2019-17625

Published: 16/10/2019 Updated: 16/10/2019
CVSS v2 Base Score: 8.5 | Impact Score: 10 | Exploitability Score: 6.8
CVSS v3 Base Score: 9 | Impact Score: 6 | Exploitability Score: 2.3
VMScore: 756
Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Summary

There is a stored XSS in Rambox 0.6.9 that can lead to code execution. The XSS is in the name field while adding/editing a service. The problem occurs due to incorrect sanitization of the name field when being processed and stored. This allows a user to craft a payload for Node.js and Electron, such as an exec of OS commands within the onerror attribute of an IMG element.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rambox rambox 0.6.9

Github Repositories

Working exploit code for CVE-2019-17625

CVE-2019-17625 There is a stored XSS vulnerability in rambox 069 due to unsantized parameters in the name field when a user is adding a service Since rambox runs on NodeJS this allows for the use of OS commands to be injected into an <a> or <img> tag Note: This code has only been tested on MacOS and may need to be reconfigured for other operating