Page 3 of 21 results (0.006 seconds)

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 1

Mautic before 3.2.4 is affected by stored XSS. An attacker with permission to manage companies, an application feature, could attack other users, including administrators. For example, by loading an externally crafted JavaScript file, an attacker could eventually perform actions as the target user. These actions include changing the user passwords, altering user or email addresses, or adding a new administrator to the system. Mautic versiones anteriores a 3.2.4, está afectado por una vulnerabilidad de tipo XSS almacenado. • https://forum.mautic.org/c/announcements/16 https://forum.mautic.org/t/security-release-for-all-versions-of-mautic-prior-to-2-16-5-and-3-2-4/17786 https://labs.bishopfox.com/advisories/mautic-version-3.2.2 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Mautic 2.13.1. It has Stored XSS via the company name field. Se detectó un problema en Mautic versión 2.13.1. Presenta una vulnerabilidad de tipo XSS almacenado por medio del campo company name. • https://github.com/mautic/mautic/releases/tag/2.14.0 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Mautic 2.13.1. There is Stored XSS via the authorUrl field in config.json. Se descubrió un problema en Mautic 2.13.1. Hay XSS almacenado a través del campo authorUrl en config.json. • https://github.com/mautic/mautic/releases https://github.com/mautic/mautic/releases/tag/2.14.0 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.1EPSS: 0%CPEs: 26EXPL: 0

Mautic versions 2.0.0 - 2.11.0 with a SSO plugin installed could allow a disabled user to still login using email address Mautic, de la versión 2.0.0 a la 2.11.0, con un plugin SSO instalado podría permitir que un usuario deshabilitado pueda seguir iniciando sesión mediante una dirección de correo electrónico. • https://github.com/mautic/mautic/releases/tag/2.12.0 • CWE-287: Improper Authentication •

CVSS: 6.5EPSS: 0%CPEs: 46EXPL: 1

Mautic versions 1.0.0 - 2.11.0 are vulnerable to allowing any authorized Mautic user session (must be logged into Mautic) to use the Filemanager to download any file from the server that the web user has access to. Mautic, de la versión 1.0.0 a la 2.11.0, es vulnerable a permitir que cualquier sesión de usuario autorizada de Mautic (debe haber iniciado sesión) utilice el Filemanager para descargar cualquier archivo del servidor al que tenga acceso el usuario web. • https://github.com/mautic/mautic/releases/tag/2.12.0 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •