CVE-2020-11106

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-11106
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-11106.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-11106
Published
2020-03-30T22:15:15Z
Modified
2025-02-14T10:57:28.778003Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in Responsive Filemanager through 9.14.0. In the dialog.php page, the session variable $SESSION['RF']["viewtype"] wasn't sanitized if it was already set. This made stored XSS possible if one opens ajaxcalls.php and uses the "view" action and places a payload in the type parameter, and then returns to the dialog.php page. This occurs because ajaxcalls.php was also able to set the $SESSION['RF']["viewtype"] variable, but there it wasn't sanitized.

References

Affected packages

Git / github.com/trippo/responsivefilemanager

Affected ranges

Type
GIT
Repo
https://github.com/trippo/responsivefilemanager
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

9.*

9.9
9.9.1
9.9.2
9.9.4

v.*

v.9.10.1

v9.*

v9.10.0
v9.10.1
v9.10.2
v9.11.0
v9.11.3
v9.12.0
v9.12.1
v9.12.2
v9.13.0
v9.13.1
v9.13.3
v9.13.4
v9.14.0
v9.9.3
v9.9.4
v9.9.5
v9.9.6
v9.9.7