Description
There is a stored XSS in Rambox 0.6.9 that can lead to code execution. The XSS is in the name field while adding/editing a service. The problem occurs due to incorrect sanitization of the name field when being processed and stored. This allows a user to craft a payload for Node.js and Electron, such as an exec of OS commands within the onerror attribute of an IMG element.
Published: 2019-10-16
Score: 9.0 Critical
EPSS: 4.8% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-1982 There is a stored XSS in Rambox 0.6.9 that can lead to code execution. The XSS is in the name field while adding/editing a service. The problem occurs due to incorrect sanitization of the name field when being processed and stored. This allows a user to craft a payload for Node.js and Electron, such as an exec of OS commands within the onerror attribute of an IMG element.
Github GHSA Github GHSA GHSA-2gc6-2h2g-ph48 Rambox RCE Vulnerability
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T01:47:13.423Z

Reserved: 2019-10-16T00:00:00.000Z

Link: CVE-2019-17625

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-16T12:15:11.947

Modified: 2024-11-21T04:32:39.220

Link: CVE-2019-17625

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses