First published: Thu Feb 02 2017(Updated: )
Cross-site scripting (XSS) vulnerability in the file browser in Guacamole 0.9.8 and 0.9.9, when file transfer is enabled to a location shared by multiple users, allows remote authenticated users to inject arbitrary web script or HTML via a crafted filename. NOTE: this vulnerability was fixed in guacamole.war on 2016-01-13, but the version number was not changed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Guacamole | =0.9.8 | |
Apache Guacamole | =0.9.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1566 has a medium severity rating due to its potential for cross-site scripting attacks.
To fix CVE-2016-1566, update your Apache Guacamole installation to version 0.9.10 or later.
Users of Apache Guacamole versions 0.9.8 and 0.9.9 that have file transfer enabled are affected by CVE-2016-1566.
CVE-2016-1566 is a cross-site scripting (XSS) vulnerability.
Yes, remote authenticated users can exploit CVE-2016-1566 by injecting arbitrary web scripts or HTML through crafted filenames.