-
Notifications
You must be signed in to change notification settings - Fork 138
20200309 XSS vulnerability
Arjen van Bochoven edited this page Mar 9, 2020
·
1 revision
XSS vulnerability - CVE-2020-10192
An unauthenticated request (when no passphrase is used) can be used to inject javascript into the MunkiReport database. The same is possible from a compromised machine when passphrases are enabled.
- Version specific upgrade notes - https://github.com/munkireport/munkireport-php/wiki/How-to-Upgrade-Versions
- General upgrade documentation - https://github.com/munkireport/munkireport-php/wiki/General-Upgrade-Procedures
- Edit
munkireport-php/app/controllers/report.php
to add the following to the end of the __construct() function:
if ($_POST['serial'] !== filter_var($_POST['serial'], FILTER_SANITIZE_STRING))
{
$this->error("Serial contains illegal characters");
}
- Also update
munkireport-php/app/models/tablequery.php
to the version that ships with MR 5.3.0 - Replace that file with the one that you can download here: https://github.com/munkireport/munkireport-php/blob/71d4de2898fde211e57d418a5b7750ed54aef6f3/app/models/tablequery.php This should work for MunkiReport version 3.0.0 and up. - Also replace
munkireport-php/system/kissmvc.php
with the version you can download here: https://github.com/munkireport/munkireport-php/blob/ae95b822f0ece21f9a6f6f7cc3f741f9cac2657a/system/kissmvc.php
- General Upgrade Procedures
- How to Upgrade Versions
- Troubleshooting Upgrades
- Migrating sqlite to MySQL