ID

VAR-202002-0467


CVE

CVE-2019-19661


TITLE

Rumpus FTP Server Web File Manager Cross-Site Scripting Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2020-04694 // CNNVD: CNNVD-202002-340

DESCRIPTION

A Cookie based reflected XSS exists in the Web File Manager of Rumpus FTP Server 8.2.9.1, related to RumpusLoginUserName and snp. Rumpus FTP Exists in a cross-site scripting vulnerability.Information may be obtained and tampered with. The vulnerability stems from the lack of proper validation of client data by web applications. An attacker could use this vulnerability to execute client code

Trust: 2.16

sources: NVD: CVE-2019-19661 // JVNDB: JVNDB-2019-014497 // CNVD: CNVD-2020-04694

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-04694

AFFECTED PRODUCTS

vendor:maxummodel:rumpus ftpscope:eqversion:8.2.9.1

Trust: 1.0

vendor:maxummodel:rumpusscope:eqversion:ftp 8.2.9.1

Trust: 0.8

vendor:maxummodel:rumpus ftp serverscope:eqversion:8.2.9.1

Trust: 0.6

sources: CNVD: CNVD-2020-04694 // JVNDB: JVNDB-2019-014497 // NVD: CVE-2019-19661

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-19661
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2019-014497
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2020-04694
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202002-340
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2019-19661
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2019-014497
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-04694
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-19661
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.7
version: 3.1

Trust: 1.0

NVD: JVNDB-2019-014497
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-04694 // JVNDB: JVNDB-2019-014497 // CNNVD: CNNVD-202002-340 // NVD: CVE-2019-19661

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2019-014497 // NVD: CVE-2019-19661

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202002-340

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-202002-340

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-014497

PATCH

title:Rumpusurl:https://www.maxum.com/Rumpus/

Trust: 0.8

sources: JVNDB: JVNDB-2019-014497

EXTERNAL IDS

db:NVDid:CVE-2019-19661

Trust: 3.0

db:JVNDBid:JVNDB-2019-014497

Trust: 0.8

db:CNVDid:CNVD-2020-04694

Trust: 0.6

db:CNNVDid:CNNVD-202002-340

Trust: 0.6

sources: CNVD: CNVD-2020-04694 // JVNDB: JVNDB-2019-014497 // CNNVD: CNNVD-202002-340 // NVD: CVE-2019-19661

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2019-19661

Trust: 2.0

url:https://github.com/harshit-shukla/cve

Trust: 1.6

url:https://github.com/harshit-shukla/cve/blob/master/cve-2019-19661%20(un-authenticated).md

Trust: 1.4

url:https://github.com/harshit-shukla/cve/blob/master/cve-2019-19661%20%28un-authenticated%29.md

Trust: 1.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-19661

Trust: 0.8

url:https://github.com/harshit-shukla/cve/blob/master/cve-2019-19661%20

Trust: 0.6

sources: CNVD: CNVD-2020-04694 // JVNDB: JVNDB-2019-014497 // CNNVD: CNNVD-202002-340 // NVD: CVE-2019-19661

SOURCES

db:CNVDid:CNVD-2020-04694
db:JVNDBid:JVNDB-2019-014497
db:CNNVDid:CNNVD-202002-340
db:NVDid:CVE-2019-19661

LAST UPDATE DATE

2024-11-23T22:37:33.141000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-04694date:2020-02-12T00:00:00
db:JVNDBid:JVNDB-2019-014497date:2020-02-21T00:00:00
db:CNNVDid:CNNVD-202002-340date:2021-01-05T00:00:00
db:NVDid:CVE-2019-19661date:2024-11-21T04:35:08.480

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-04694date:2020-02-12T00:00:00
db:JVNDBid:JVNDB-2019-014497date:2020-02-21T00:00:00
db:CNNVDid:CNNVD-202002-340date:2020-02-10T00:00:00
db:NVDid:CVE-2019-19661date:2020-02-10T18:15:11.877