20200309 Authenticated Comment XSS
Arjen van Bochoven edited this page Mar 9, 2020
·
1 revision
Pages 100
Introduction
Setup
Server Configuration
Client Configuration
Upgrade
- General Upgrade Procedures
- How to Upgrade Versions
- Troubleshooting Upgrades
- Migrating sqlite to MySQL
Modules
Securing MunkiReport
Customization
Misc
Developers
Clone this wiki locally
Authenticated Comment XSS - CVE-2020-10191
Description
A logged in admin can craft a special request using his admin session credentials to inject javascript into a comment field. The javascript can be used to extract data from another admin that is logged in.
Vulnerability: Versions of MunkiReport from 2.5.3 to 5.2.x are vulnerable
Mitigation
Update MunkiReport to the latest version (Preferred)
- Version specific upgrade notes - https://github.com/munkireport/munkireport-php/wiki/How-to-Upgrade-Versions
- General upgrade documentation - https://github.com/munkireport/munkireport-php/wiki/General-Upgrade-Procedures
If updating to the latest version in not possible:
- Update the
commentmodule to v2.2 - only possible when running MunkiReport 4.3.0RC2 or higher. - Or disable the
commentmodule by removing it from theMODULES=setting in the server config.
An Opensource project