Description
An issue was discovered in Sage DPW 2020_06_x before 2020_06_002. It allows unauthenticated users to upload JavaScript (in a file) via the expenses claiming functionality. However, to view the file, authentication is required. By exploiting this vulnerability, an attacker can persistently include arbitrary HTML or JavaScript code into the affected web page. The vulnerability can be used to change the contents of the displayed site, redirect to other sites, or steal user credentials. Additionally, users are potential victims of browser exploits and JavaScript malware.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_misc
https://www.sagedpw.at
Third Party Advisory x_refsource_misc
https://sec-consult.com/en/vulnerability-lab/advisories/
Mailing List, Third Party Advisory x_refsource_misc
https://seclists.org/fulldisclosure/2020/Oct/17
Scores
CVSS v3
6.1
EPSS
0.0078
EPSS Percentile
73.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-434
Status
published
Products (1)
sagedpw/sage_dpw
2020_06_000 - 2020_06_002
Published
Oct 16, 2020
Tracked Since
Feb 18, 2026