vendor:
ProjectSend
by:
Michael Helwig
4,3
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: ProjectSend
Affected Version From: r582
Affected Version To: r582
Patch Exists: YES
Related CWE: N/A
CPE: a:projectsend:projectsend:r582
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu 14.04 with Firefox 45.0
2016
Multiple (persistent) XSS in ProjectSend
ProjectSend is a self-hosted PHP based file-transfer platform. Several serious vulnerabilities have been discovered so far. Here are some further persistent and non-persistent XSS vulnerabilities which affect ProjectSend. Non-persistent XSS can be exploited by sending a malicious payload in the searchbox on my_files/index.php and as admin in searchboxes on 'Manage Clients', 'Clients groups' and 'System Users'.
Mitigation:
Input validation and output encoding should be used to prevent XSS attacks.