- a previously assumed internal url can have user input appended via the MISP local tool connector - requires a compromised connected MISP instance where a malicious administrator modifies the UUIDs of cerebrate relevant objects to JS payloads - as reported by Dawid Czarcnecki of Zigrin Security |
||
|---|---|---|
| .. | ||
| Settings | ||
| UserSettings | ||
| charts | ||
| flash | ||
| genericElements | ||
| layouts | ||
| widgets | ||
| footer.php | ||
| header.php | ||
| side_menu.php | ||