First published: Thu Mar 12 2020(Updated: )
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/trash-box.php by adding a question mark (?) followed by the payload.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Chadhaajay Phpkb | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10456 is a vulnerability in Chadha PHPKB Standard Multi-Language 9 that allows for Reflected XSS attacks.
CVE-2020-10456 works by injecting arbitrary web script or HTML in admin/trash-box.php by adding a question mark (?) followed by the payload in the URI.
CVE-2020-10456 has a severity rating of medium with a CVSS score of 4.8.
To fix CVE-2020-10456, update Chadha PHPKB Standard Multi-Language to the latest version available.
You can find more information about CVE-2020-10456 at the following references: http://antoniocannito.it/?p=137#uxss and https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456.