First published: Wed Dec 30 2020(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** Sentrifugo 3.2 allows Stored Cross-Site Scripting (XSS) vulnerability by inserting a payload within the X-Forwarded-For HTTP header during the login process. When an administrator looks at logs, the payload is executed. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sapplica Sentrifugo | =3.2 | |
=3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28365 is a stored Cross-Site Scripting (XSS) vulnerability in Sentrifugo 3.2.
The severity of CVE-2020-28365 is medium with a CVSS score of 6.1.
CVE-2020-28365 affects Sentrifugo 3.2 by allowing Stored Cross-Site Scripting (XSS) attacks during the login process.
To fix CVE-2020-28365, it is recommended to update Sentrifugo to a supported version or apply a patch provided by the vendor.
Yes, you can find references for CVE-2020-28365 at the following links: [link1](https://github.com/sapplica/sentrifugo/commits/master) and [link2](https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2020-055).