First published: Mon Feb 12 2018(Updated: )
Progress Sitefinity 9.1 has XSS via file upload, because JavaScript code in an HTML file has the same origin as the application's own code. This is fixed in 10.1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Sitefinity | =9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18176 is a vulnerability in Progress Sitefinity version 9.1 that allows XSS attacks through file upload.
CVE-2017-18176 works by allowing JavaScript code in an HTML file to have the same origin as the application's own code, enabling XSS attacks.
CVE-2017-18176 has a severity level of 5.4, which is considered medium.
To fix CVE-2017-18176, you should update to Progress Sitefinity version 10.1, where this vulnerability is fixed.
Yes, you can find more information about CVE-2017-18176 in the following references: [Reference 1](https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html), [Reference 2](https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-progress-sitefinity/index.html).