CVE-2017-6478

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to inject malicious scripts into a web page, which could then be executed in the browser of anyone visiting the affected site. It occurs when a user accesses the installation page with a specially crafted URL, making it possible for the attacker to manipulate the content displayed to users.

Technical Description

paintballrefjosh/MaNGOSWebV4 before 4.0.8 is vulnerable to a reflected XSS in install/index.php (step parameter).

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$862($500-$1K)
Vendor Response
Grade FPatched in 3266 days

Quick Information

Published

Mar 5, 2017

almost 9 years ago

Last Modified

Feb 13, 2026

7 days ago

Vendor

mangoswebv4 project

Product

mangoswebv4