![]() - a previously assumed internal url can have user input appended via the MISP local tool connector - requires a compromised connected MISP instance where a malicious administrator modifies the UUIDs of cerebrate relevant objects to JS payloads - as reported by Dawid Czarcnecki of Zigrin Security |
||
---|---|---|
.. | ||
Fields | ||
headers.php | ||
index_table.php | ||
pagination.php | ||
pagination_counter.php | ||
pagination_limiter.php | ||
pagination_links.php | ||
row.php |