cve/2016/CVE-2016-1566.md

18 lines
891 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2016-1566](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1566)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Cross-site scripting (XSS) vulnerability in the file browser in Guacamole 0.9.8 and 0.9.9, when file transfer is enabled to a location shared by multiple users, allows remote authenticated users to inject arbitrary web script or HTML via a crafted filename. NOTE: this vulnerability was fixed in guacamole.war on 2016-01-13, but the version number was not changed.
### POC
#### Reference
- https://sourceforge.net/p/guacamole/news/2016/02/security-advisory---stored-xss-cve-2016-1566--guac-1465/
#### Github
No PoCs found on GitHub currently.