Learn about CVE-2020-36654, a cross-site scripting vulnerability in GENI Portal sliceresource.php. Find out how to mitigate this issue and apply the necessary patch for protection.
A vulnerability has been discovered in GENI Portal sliceresource.php that allows for cross-site scripting attacks. The issue affects the function no_invocation_id_error and can be exploited remotely. The vulnerability has been classified as problematic and assigned the identifier VDB-218475.
Understanding CVE-2020-36654
This CVE entry pertains to a cross-site scripting vulnerability found in the GENI Portal, specifically in the function no_invocation_id_error of the file sliceresource.php.
What is CVE-2020-36654?
The CVE-2020-36654 vulnerability involves the manipulation of the invocation_id/invocation_user argument, leading to cross-site scripting attacks that can be initiated remotely.
The Impact of CVE-2020-36654
The vulnerability allows attackers to execute malicious scripts on the victim's browser, potentially compromising sensitive data or performing unauthorized actions on behalf of the user.
Technical Details of CVE-2020-36654
This section provides more in-depth technical information about the vulnerability.
Vulnerability Description
The vulnerability in GENI Portal sliceresource.php allows for the injection of malicious scripts through the manipulation of the invocation_id/invocation_user argument.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited remotely by manipulating the invocation_id/invocation_user argument to inject and execute malicious scripts.
Mitigation and Prevention
To address CVE-2020-36654, immediate actions and long-term security practices are recommended.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
It is crucial to apply the patch (39a96fb4b822bd3497442a96135de498d4a81337) provided to mitigate the cross-site scripting vulnerability in GENI Portal sliceresource.php.