GONICUS.GOsa.WebUI.Change.Password.Form.Reflected.XSS
Description
This indicates an attack attempt to exploit a Cross-Site Scripting vulnerability in Epson AirPrint web configuration page.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. As a result, a remote attacker can exploit this to execute arbitrary script code within the context of the application.
Affected Products
GONICUS GOsa version before commit 56070d6289d47ba3f5918885954dcceb75606001
Impact
System Compromise: Remote attackers can execute arbitrary script code within the context of the target user's browser
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://github.com/gosa-project/gosa-core
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-06-06 | 14.627 | Severity:low:medium |