CVE-2019-17625 (NVD)

2019-10-16

There is a stored XSS in Rambox 0.6.9 that can lead to code execution. The XSS is in the name field while adding/editing a service. The problem occurs due to incorrect sanitization of the name field when being processed and stored. This allows a user to craft a payload for Node.js and Electron, such as an exec of OS commands within the onerror attribute of an IMG element.

Products Rambox
Type Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
First patch - None (likely due to unavailable code)
Links https://github.com/ramboxapp/community-edition/issues/2418