<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reflected Cross Site Scripting (XSS) in Administration Console (CVE-2020-18327) in Alfresco Forum</title>
    <link>https://connect.hyland.com/t5/alfresco-forum/reflected-cross-site-scripting-xss-in-administration-console-cve/m-p/144441#M38345</link>
    <description>&lt;P&gt;Since 5.2 is not supported any more, please upgrade to 6.2 version or later.&lt;/P&gt;
&lt;P&gt;More details on the vulnerability available in &lt;A href="https://gist.github.com/paatui/a3c7ca8cf12594b437d3854f13d76cb8" target="_blank" rel="nofollow noopener noreferrer"&gt;https://gist.github.com/paatui/a3c7ca8cf12594b437d3854f13d76cb8&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 27 Mar 2023 07:52:05 GMT</pubDate>
    <dc:creator>angelborroy</dc:creator>
    <dc:date>2023-03-27T07:52:05Z</dc:date>
    <item>
      <title>Reflected Cross Site Scripting (XSS) in Administration Console (CVE-2020-18327)</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/reflected-cross-site-scripting-xss-in-administration-console-cve/m-p/144440#M38344</link>
      <description>&lt;P&gt;Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.&lt;/P&gt;&lt;P&gt;Penetration tester found that Alfresco CMS version (v.5.2.0) affected by CVE-2020-18327 which may allow authenticated user (administrator) performed reflected XSS via the "action" parameter in the "alfresco/s/admin/admin-nodebrowser" API.&lt;/P&gt;&lt;P&gt;This vulnerability may allow attacker to inject malicious javascript on the victim web browser. This malicious javascript may able to perform various activities, such as:&lt;BR /&gt;1. Steal victim user session cookies.&lt;BR /&gt;2. Perform any action within the application that the user can perform.&lt;BR /&gt;3. View any information that the user is able to view.&lt;BR /&gt;4. Modify any information that the user is able to modify.&lt;BR /&gt;5. Initiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 03:08:55 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/reflected-cross-site-scripting-xss-in-administration-console-cve/m-p/144440#M38344</guid>
      <dc:creator>leochan168</dc:creator>
      <dc:date>2023-03-27T03:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: Reflected Cross Site Scripting (XSS) in Administration Console (CVE-2020-18327)</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/reflected-cross-site-scripting-xss-in-administration-console-cve/m-p/144441#M38345</link>
      <description>&lt;P&gt;Since 5.2 is not supported any more, please upgrade to 6.2 version or later.&lt;/P&gt;
&lt;P&gt;More details on the vulnerability available in &lt;A href="https://gist.github.com/paatui/a3c7ca8cf12594b437d3854f13d76cb8" target="_blank" rel="nofollow noopener noreferrer"&gt;https://gist.github.com/paatui/a3c7ca8cf12594b437d3854f13d76cb8&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 07:52:05 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/reflected-cross-site-scripting-xss-in-administration-console-cve/m-p/144441#M38345</guid>
      <dc:creator>angelborroy</dc:creator>
      <dc:date>2023-03-27T07:52:05Z</dc:date>
    </item>
  </channel>
</rss>

