Miggo Logo

CVE-2018-16405:
mayan-edms Cross-site Scripting vulnerability

6.1

CVSS Score
3.0

Basic Information

EPSS Score
0.55325%
Published
9/6/2018
Updated
9/30/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
mayan-edmspip< 3.0.23.0.2
mayan-edms-ngpip>= 0, < 3.0.23.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from client-side JavaScript in base_plain.html that unsafely sets window.location using URL hash input. While the XSS execution occurs client-side, the server-side views that render this template (used by authentication endpoints) are critical components in delivering the vulnerable code. The affected URLs (/authentication/login/, /authentication/password/reset/, etc.) correspond to Django view classes in the authentication app that would appear in server-side profiler traces when these endpoints are accessed. Confidence is medium as we infer view names from URL patterns and Django conventions, though exact implementation details aren't shown in provided patches.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in M*y*n **MS ***or* *.*.*. T** *pp**r*n** *pp s*ts win*ow.lo**tion *ir**tly, l***in* to XSS.

Reasoning

T** vuln*r**ility st*ms *rom *li*nt-si** J*v*S*ript in **s*_pl*in.*tml t**t uns***ly s*ts win*ow.lo**tion usin* URL **s* input. W*il* t** XSS *x**ution o**urs *li*nt-si**, t** s*rv*r-si** vi*ws t**t r*n**r t*is t*mpl*t* (us** *y *ut**nti**tion *n*poi