Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
CVEs/CVE-2020-8951
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
57 lines (57 sloc)
1.43 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| > Fiserv Accurate Reconciliation 2.19.0 allows XSS via the Source or | |
| > Destination field of the Configuration Manager (Configuration | |
| > Parameter Translation) page. | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Additional Information] | |
| > Capital "R" letters in the payload were used to bypass application layer filtering <scRipt>onerror=alert`XSS`</script> | |
| > | |
| > The payload will be executed each time the affected page is accessed. | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Vulnerability Type] | |
| > Cross Site Scripting (XSS) | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Vendor of Product] | |
| > Fiserv, Inc. | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Affected Product Code Base] | |
| > Accurate Reconciliation - 2.19.0 | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Affected Component] | |
| > Web application (Configuration Manager) | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Attack Type] | |
| > Remote | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Impact Code execution] | |
| > true | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Attack Vectors] | |
| > Stored Cross Site Scripting (XSS) attacks are delivered to victims by | |
| > storing payloads within the application which are later executed when | |
| > an unsuspecting user accesses the page. | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Discoverer] | |
| > Artem Brunov on behalf of TAL Australia | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Reference] | |
| > https://www.esecure.com.au/news |