First published: Tue Apr 04 2023(Updated: )
A reflected XSS via POST vulnerability in report scheduler of Sophos Web Appliance versions older than 4.3.10.4 allows execution of JavaScript code in the victim browser via a malicious form that must be manually submitted by the victim while logged in to SWA.
Credit: security-alert@sophos.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sophos Web Appliance | <4.3.10.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36692 is a reflected XSS via POST vulnerability in the report scheduler of Sophos Web Appliance versions older than 4.3.10.4.
CVE-2020-36692 allows the execution of JavaScript code in the victim's browser through a malicious form that needs to be manually submitted by the victim while logged into SWA.
The severity of CVE-2020-36692 is medium, with a CVSS score of 5.4.
To fix the CVE-2020-36692 vulnerability, it is recommended to update Sophos Web Appliance to version 4.3.10.4 or later.
Yes, you can find more information about CVE-2020-36692 in the Sophos Security Advisory at the following URL: https://www.sophos.com/en-us/security-advisories/sophos-sa-20230404-swa-rce