First published: Wed Feb 20 2019(Updated: )
The HAProxy package before 0.59_16 for pfSense has XSS via the desc (aka Description) or table_actionsaclN parameter, related to haproxy_listeners.php and haproxy_listeners_edit.php.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgate Haproxy | <0.59_16 | |
<0.59_16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-8953.
The severity of CVE-2019-8953 is medium.
The affected software is Netgate Haproxy before version 0.59_16.
The vulnerability occurs via XSS (Cross-Site Scripting) through the desc or table_actionsaclN parameter in haproxy_listeners.php and haproxy_listeners_edit.php.
Yes, you can find references for this vulnerability at the following links: [1](https://cxsecurity.com/issue/WLB-2019020153), [2](https://github.com/pfsense/FreeBSD-ports/commit/2dded47b3202dfdf89aa96f84bf701b3d5acbe6c), [3](https://github.com/pfsense/FreeBSD-ports/commit/3b40366aca55910b224ecf49d3fdacc9ad6c04f5).