APfell 1.4 is vulnerable to authenticated reflected cross-site scripting (XSS) in /apiui/command_ through the payloadtypes_callback function, which allows an attacker to steal remote admin/user session and/or adding new users to the administration panel.
References
Link | Resource |
---|---|
https://github.com/its-a-feature/Apfell/commit/5fc64502bc008388514f2b5d1160b677e3b4a7f3 | Patch Third Party Advisory |
https://seekurity.com/blog/2020/04/19/admin/advisories/apfell-post-exploitation-red-team-framework-authenticated-cross-site-scripting-vulnerability | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-01-26 18:15
Updated : 2021-01-29 22:44
NVD link : CVE-2020-23014
Mitre link : CVE-2020-23014
CVE.ORG link : CVE-2020-23014
JSON object : View
Products Affected
apfell_project
- apfell
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')