Unfiltered $args Variable in REDAXO 5.6.2 Allows XSS Payload Injection

Unfiltered $args Variable in REDAXO 5.6.2 Allows XSS Payload Injection

CVE-2018-17830 · LOW Severity

AV:N/AC:M/AU:S/C:N/I:P/A:N

The $args variable in addons/mediapool/pages/index.php in REDAXO 5.6.2 is not effectively filtered, because names are not restricted (only values are restricted). The attacker can insert XSS payloads via an index.php?page=mediapool/media&opener_input_field=&args[ substring.

Learn more about our Web Application Penetration Testing UK.