Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Subrion
(Intelliants)Repositories | https://github.com/intelliants/subrion |
#Vulnerabilities | 25 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-09-27 | CVE-2023-43828 | A Cross-site scripting (XSS) vulnerability in /panel/languages/ of Subrion v4.2.1 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into 'Title' parameter. | Subrion | 5.4 | ||
2023-09-27 | CVE-2023-43830 | A Cross-site scripting (XSS) vulnerability in /panel/configuration/financial/ of Subrion v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into several fields: 'Minimum deposit', 'Maximum deposit' and/or 'Maximum balance'. | Subrion | 5.4 | ||
2023-09-28 | CVE-2023-43884 | A Cross-site scripting (XSS) vulnerability in Reference ID from the panel Transactions, of Subrion v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into 'Reference ID' parameter. | Subrion | 5.4 | ||
2023-11-03 | CVE-2023-46947 | Subrion 4.2.1 has a remote command execution vulnerability in the backend. | Subrion | 8.8 | ||
2020-11-04 | CVE-2019-7356 | Subrion CMS v4.2.1 allows XSS via the panel/phrases/ VALUE parameter. | Subrion | 5.4 | ||
2020-05-15 | CVE-2019-20390 | A Cross-Site Request Forgery (CSRF) vulnerability was discovered in Subrion CMS 4.2.1 that allows a remote attacker to remove files on the server without a victim's knowledge, by enticing an authenticated user to visit an attacker's web page. The application fails to validate the CSRF token for a GET request. An attacker can craft a panel/uploads/read.json?cmd=rm URL (removing this token) and send it to the victim. | Subrion | N/A | ||
2020-05-15 | CVE-2019-20389 | An XSS issue was identified on the Subrion CMS 4.2.1 /panel/configuration/general settings page. A remote attacker can inject arbitrary JavaScript code in the v[language_switch] parameter (within multipart/form-data), which is reflected back within a user's browser without proper output encoding. | Subrion | N/A | ||
2020-04-29 | CVE-2020-12469 | admin/blocks.php in Subrion CMS through 4.2.1 allows PHP Object Injection (with resultant file deletion) via serialized data in the subpages value within a block to blocks/edit. | Subrion | N/A | ||
2020-04-29 | CVE-2020-12468 | Subrion CMS 4.2.1 allows CSV injection via a phrase value within a language. This is related to phrases/add/ and languages/download/. | Subrion | N/A | ||
2020-04-29 | CVE-2020-12467 | Subrion CMS 4.2.1 allows session fixation via an alphanumeric value in a session cookie. | Subrion | N/A |