FluxCP is a web-based Control Panel for rAthena servers written in PHP. A javascript injection is possible via venders/buyers list pages and shop names, that are currently not sanitized. This allows executing arbitrary javascript code on the user's browser just by visiting the shop pages. As a result all logged in to fluxcp users can have their session info stolen. This issue has been addressed in release version 1.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Sep 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rathena
Rathena fluxcp |
|
CPEs | cpe:2.3:a:rathena:fluxcp:-:*:*:*:*:*:*:* | |
Vendors & Products |
Rathena
Rathena fluxcp |
|
Metrics |
ssvc
|
Mon, 16 Sep 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | FluxCP is a web-based Control Panel for rAthena servers written in PHP. A javascript injection is possible via venders/buyers list pages and shop names, that are currently not sanitized. This allows executing arbitrary javascript code on the user's browser just by visiting the shop pages. As a result all logged in to fluxcp users can have their session info stolen. This issue has been addressed in release version 1.3. All users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | Javascript Injection in Vending Info/Buyers Info Module in FluxCP | |
Weaknesses | CWE-200 CWE-79 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-16T20:02:47.454Z
Reserved: 2024-09-09T14:23:07.503Z
Link: CVE-2024-45799

Updated: 2024-09-16T20:02:40.908Z

Status : Awaiting Analysis
Published: 2024-09-16T19:16:10.880
Modified: 2024-09-20T12:31:20.110
Link: CVE-2024-45799

No data.