First published: Tue Mar 28 2017(Updated: )
Revive Adserver before 3.2.3 suffers from Persistent XSS. A vector for persistent XSS attacks via the Revive Adserver user interface exists, requiring a trusted (non-admin) account. The website name wasn't properly escaped when displayed in the campaign-zone.php script.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Revive Adserver | <=3.2.2 |
https://github.com/revive-adserver/revive-adserver/commit/f6880330a8e11e804663f132867e9eb9b1f94e83
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-9130 is classified as medium due to its potential for persistent XSS attacks.
To fix CVE-2016-9130, upgrade to Revive Adserver version 3.2.3 or later, where the vulnerability has been addressed.
The impact of CVE-2016-9130 allows attackers to execute scripts in the context of a victim's browser via stored XSS.
Users of Revive Adserver versions prior to 3.2.3 with non-admin accounts are affected by CVE-2016-9130.
CVE-2016-9130 is related to persistent cross-site scripting (XSS) vulnerabilities in web applications.