Descripción
IPFire versions prior to 2.29 (Core Update 198) contain a stored cross-site scripting (XSS) vulnerability that allows an authenticated attacker inject arbitrary JavaScript code through the TLS_HOSTNAME parameter when adding a new DNS entry. When user adds entry, application issues HTTP POST request /cgi-bin/dns.cgi and TLS hostname is provided in parameter. The value of this later rendered web interface without proper sanitation or encoding, allowing injected scripts execute context other users who view affected configuration.
https://bugzilla.ipfire.org/show_bug.cgi?id=13892
https://www.ipfire.org/blog/ipfire-2-29-core-update-198-released
https://www.vulncheck.com/advisories/ipfire-stored-xss-via-dns-settings-dns-cgi