A vulnerability has been found in MOPCMS up to 2018-11-30 (Content Management System) and classified as problematic. Affected by this vulnerability is a functionality of the file /mopcms/X0AZgf(index).php?mod=column&ac=list&menuid=28&ac=add&menuid=29. The manipulation of the argument form[name]
as part of a Parameter leads to a cross site scripting vulnerability (Persistent). The CWE definition for the vulnerability is CWE-79. As an impact it is known to affect integrity. An attacker might be able to inject arbitrary html and script code into the web site. This would alter the appearance and would make it possible to initiate further attacks against site visitors.
The weakness was disclosed 02/22/2019. This vulnerability is known as CVE-2019-9016 since 02/22/2019. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Technical details of the vulnerability are known, but there is no available exploit. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 02/23/2019).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The entries 131106 are pretty similar.
CPE
CVSSv3
VulDB Meta Base Score: 5.7
VulDB Meta Temp Score: 5.7
VulDB Base Score:
5.3VulDB Temp Score:
5.3VulDB Vector:
🔒VulDB Reliability:
🔍NVD Base Score:
6.1NVD Vector:
🔒CVSSv2
VulDB Base Score:
🔒VulDB Temp Score:
🔒VulDB Reliability:
🔍NVD Base Score:
🔒Exploiting
Class: Cross site scripting / Persistent (
CWE-79)
Local: No
Remote: Yes
Availability:
🔒Status: Not defined
Price Prediction:
🔍Current Price Estimation:
🔒Threat Intelligence
Threat:
🔍Adversaries:
🔍Geopolitics:
🔍Economy:
🔍Predictions:
🔍Actions:
🔍Countermeasures
Recommended: no mitigation known
0-Day Time:
🔒Timeline
02/22/2019 Advisory disclosed
02/22/2019 CVE assigned02/23/2019 VulDB entry created02/23/2019 VulDB last updateSources
CVE:
CVE-2019-9016 (
🔒)
See also:
🔒Entry
Created: 02/23/2019
Complete:
🔍Lien vers l'article source