Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2019-16982: Update access_control_nodes.php · fusionpbx/fusionpbx@c9f87dc

In FusionPBX up to v4.5.7, the file app\access_controls\access_control_nodes.php uses an unsanitized “id” variable coming from the URL, which is reflected in HTML, leading to XSS.

CVE
#xss#php

@@ -13,7 +13,7 @@

The Original Code is FusionPBX

The Initial Developer of the Original Code is

Mark J Crane [email protected]

Portions created by the Initial Developer are Copyright © 2018

Portions created by the Initial Developer are Copyright © 2019

the Initial Developer. All Rights Reserved.

Contributor(s):

Mark J Crane [email protected]

@@ -26,7 +26,8 @@

//check permissions

if (!permission_exists(‘access_control_node_view’)) {

echo "access denied"; exit;

echo "access denied";

exit;

}

//add multi-lingual support

@@ -87,7 +88,7 @@

echo th_order_by('node_description’, $text[‘label-node_description’], $order_by, $order);

echo "<td class=’list_control_icons’>";

if (permission_exists(‘access_control_node_add’)) {

echo "<a href=’access_control_node_edit.php?access_control_uuid=".escape($_GET[‘id’])."’ alt=’".$text[‘button-add’]."’>$v_link_label_add</a>";

echo "<a href=’access_control_node_edit.php?access_control_uuid=".urlencode($_GET[‘id’])."’ alt=’".$text[‘button-add’]."’>$v_link_label_add</a>";

}

else {

echo " \n";

@@ -98,7 +99,7 @@

if (is_array($access_control_nodes)) {

foreach($access_control_nodes as $row) {

if (permission_exists(‘access_control_node_edit’)) {

$tr_link = "href=’access_control_node_edit.php?access_control_uuid=".escape($row[‘access_control_uuid’])."&id=".escape($row[‘access_control_node_uuid’])."’";

$tr_link = "href=’access_control_node_edit.php?access_control_uuid=".urlencode($row[‘access_control_uuid’])."&id=".urlencode($row[‘access_control_node_uuid’])."’";

}

echo "<tr ".$tr_link.">\n";

echo " <td valign=’top’ class=’".$row_style[$c]."’>".escape($row[‘node_type’])." </td>\n";

@@ -107,10 +108,10 @@

echo " <td valign=’top’ class=’".$row_style[$c]."’>".escape($row[‘node_description’])." </td>\n";

echo " <td class=’list_control_icons’>";

if (permission_exists(‘access_control_node_edit’)) {

echo "<a href=’access_control_node_edit.php?access_control_uuid=".escape($row[‘access_control_uuid’])."&id=".escape($row[‘access_control_node_uuid’])."’ alt=’".$text[‘button-edit’]."’>$v_link_label_edit</a>";

echo "<a href=’access_control_node_edit.php?access_control_uuid=".urlencode($row[‘access_control_uuid’])."&id=".urlencode($row[‘access_control_node_uuid’])."’ alt=’".$text[‘button-edit’]."’>$v_link_label_edit</a>";

}

if (permission_exists(‘access_control_node_delete’)) {

echo "<a href=’access_control_node_delete.php?access_control_uuid=".escape($row[‘access_control_uuid’])."&id=".escape($row[‘access_control_node_uuid’])."’ alt=’".$text[‘button-delete’]."’ onclick=\"return confirm(‘".$text[‘confirm-delete’]."’)\">$v_link_label_delete</a>";

echo "<a href=’access_control_node_delete.php?access_control_uuid=".urlencode($row[‘access_control_uuid’])."&id=".urlencode($row[‘access_control_node_uuid’])."’ alt=’".$text[‘button-delete’]."’ onclick=\"return confirm(‘".$text[‘confirm-delete’]."’)\">$v_link_label_delete</a>";

}

echo " </td>\n";

echo "</tr>\n";

@@ -122,7 +123,7 @@

echo "</table>\n";

if (permission_exists(‘access_control_node_add’)) {

echo "<div style=’float: right;’>\n";

echo " <a href=’access_control_node_edit.php?access_control_uuid=".escape($_GET[‘id’])."’ alt=’".$text[‘button-add’]."’>$v_link_label_add</a>";

echo " <a href=’access_control_node_edit.php?access_control_uuid=".urlencode($_GET[‘id’])."’ alt=’".$text[‘button-add’]."’>$v_link_label_add</a>";

echo "</div>\n";

}

echo "<br />\n";

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907