CVE-2017-6478
Medium
|6.1Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to inject malicious scripts into a web page, which could then be executed in the browser of anyone visiting the affected site. It occurs when a user accesses the installation page with a specially crafted URL, making it possible for the attacker to manipulate the content displayed to users.
Technical Description
paintballrefjosh/MaNGOSWebV4 before 4.0.8 is vulnerable to a reflected XSS in install/index.php (step parameter).
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$862($500-$1K)
Vendor Response
Grade FPatched in 3266 days
Quick Information
Published
Mar 5, 2017
almost 9 years ago
Last Modified
Feb 13, 2026
7 days ago
Vendor
mangoswebv4 project
Product
mangoswebv4