| शीर्षक | GitHub Web Application Express Gateway 1.16.10 and possibly earlier Cross Site Scripting |
|---|
| विवरण | A reflected cross-site scripting (XSS) vulnerability has been identified in Express Gateway version 1.16.10. The application does not properly sanitize user-supplied input in the /apps/:id and /users/:id routes before reflecting it in HTTP responses. An attacker can craft a malicious URL containing arbitrary JavaScript code, which will be executed in the context of a victim’s browser when the URL is accessed. This issue can lead to session hijacking, unauthorized actions, or data exfiltration when an administrator or other privileged user visits the crafted link. |
|---|
| स्रोत | ⚠️ https://github.com/freshfish-hust/my-cves/issues/6 |
|---|
| उपयोगकर्ता | Haoatao (UID 88608) |
|---|
| सबमिशन | 03/08/2025 01:14 PM (9 महीनों पहले) |
|---|
| संयम | 17/08/2025 02:54 PM (14 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 320418 [ExpressGateway express-gateway तक 1.16.10 REST Endpoint lib/rest/routes/apps.js क्रॉस साइट स्क्रिप्टिंग] |
|---|
| अंक | 20 |
|---|