vendor:
DynPG
by:
Enes Özeser
8.8
CVSS
HIGH
Persistent Cross-Site Scripting
79
CWE
Product Name: DynPG
Affected Version From: 4.9.1
Affected Version To: 4.9.1
Patch Exists: NO
Related CWE: N/A
CPE: a:dynpg:dynpg:4.9.1
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows & XAMPP
2020
DynPG 4.9.1 – Persistent Cross-Site Scripting (Authenticated)
An authenticated persistent cross-site scripting (XSS) vulnerability exists in DynPG 4.9.1. An attacker can exploit this vulnerability by sending a malicious payload to the application via the 'Groupname' parameter. The malicious payload is then stored in the application and is triggered when the application is accessed by an authenticated user.
Mitigation:
Input validation should be used to prevent malicious payloads from being stored in the application. Additionally, the application should be configured to use a secure flag on the cookie.