PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-6397 Flightairmap CVE debrief

CVE-2017-6397 is a medium-severity cross-site scripting vulnerability in FlightAirMap v1.0-beta.10. The affected application pages do not sufficiently filter multiple user-supplied parameters, allowing an attacker to inject HTML or script that runs in a victim’s browser in the context of the vulnerable website.

Vendor
Flightairmap
Product
CVE-2017-6397
CVSS
MEDIUM 6.1
CISA KEV
Not listed in stored evidence
Original CVE published
2017-03-02
Original CVE updated
2026-05-13
Advisory published
2017-03-02
Advisory updated
2026-05-13

Who should care

Administrators and developers running FlightAirMap v1.0-beta.10 should treat this as relevant, especially if any of the affected *-sub-menu.php pages are reachable by users or receive untrusted input. Security teams should also check whether any older deployments still expose this beta release.

Technical summary

NVD classifies the issue as CWE-79 and assigns CVSS 3.1 vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N (6.1). The vulnerability is described as insufficient filtration of user-supplied data in multiple parameters passed to several *-sub-menu.php pages, which can let attacker-controlled HTML or JavaScript execute in the browser under the site’s origin.

Defensive priority

Medium. The impact is limited by the need for user interaction, but successful XSS can still expose data, alter page behavior, and enable impersonation or other in-browser abuse in the affected web app.

Recommended defensive actions

  • Upgrade or replace FlightAirMap v1.0-beta.10 with a version that contains the vendor fix referenced in the project issue tracker.
  • Review every affected *-sub-menu.php page and ensure user-controlled parameters are validated server-side and output-encoded before rendering.
  • Apply context-appropriate output escaping for HTML, attributes, and JavaScript contexts; do not rely on client-side filtering alone.
  • Add or tighten a Content Security Policy and other browser-side hardening controls to reduce the impact of any missed injection points.
  • Re-test the affected pages after remediation to confirm that crafted parameters are rendered inert and no script execution occurs.

Evidence notes

The supplied NVD record and CVE description both identify a browser-side script injection issue in FlightAirMap v1.0-beta.10 caused by insufficient filtering in several *-sub-menu.php pages. The record lists CWE-79 and the CVSS 3.1 vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The CVE was originally published on 2017-03-02 and the NVD record was modified on 2026-05-13. References include a SecurityFocus BID entry and a GitHub issue that is tagged as an exploit/patch/third-party advisory reference in the source corpus.

Official resources

Public CVE disclosure date in the supplied record is 2017-03-02. The NVD entry was later modified on 2026-05-13. No KEV entry was provided in the supplied enrichment.