Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-3950: 标签页xss修复 · sanluan/PublicCMS@a972dc9

A vulnerability, which was classified as problematic, was found in sanluan PublicCMS. Affected is the function initLink of the file dwz.min.js of the component Tab Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is a972dc9b1c94aea2d84478bf26283904c21e4ca2. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213456.

CVE
#xss#vulnerability#js#java

@@ -1942,15 +1942,11 @@ function initLink($p) { $("a[target=navTab]“, $p).each(function() { $(this).click(function(event) { var $this = $(this); var title = $this.attr(“title”) || $this.text(); var title = $this.attr(“title”) || $this.text(); if(title){ title = title.replace(/<[^>]*>/gi,"”); } var titleHtml = $this.attr(“title”) || $this.html(); var icon = $this.attr(“icon”); if(icon){ titleHtml = icon + " " + titleHtml; } var icon = $this.attr(“icon”) || $this.find(“i”).prop(“outerHTML”); var tabid = $this.attr(“rel”) || "_blank"; var fresh = eval($this.attr(“fresh”) || “true”); var external = eval($this.attr(“external”) || “false”); @@ -1962,7 +1958,7 @@ function initLink($p) { return false; } navTab.openTab(tabid, url, { title: title, titleHtml: titleHtml, fresh: fresh, external: external, focusNewWindow:newWindow title: title, icon: icon, fresh: fresh, external: external, focusNewWindow:newWindow }); return false; }); @@ -1972,7 +1968,7 @@ function initLink($p) { $("a[target=dialog]", $p).each(function() { $(this).click(function(event) { var $this = $(this); var title = $this.attr(“title”) || $this.html(); var title = $this.attr(“title”) || $this.text(); var rel = $this.attr(“rel”) || "_blank"; var options = {}; var w = $this.attr(“width”); @@ -2675,7 +2671,7 @@ var navTab = { openTab: function(tabid, url, options) { // if found tabid replace tab, // else create a new tab. var op = $.extend({ title: "New Tab", titleHtml: "New Tab", data: {}, fresh: true, external: false, focusNewWindow:false title: “New Tab", icon: “", data: {}, fresh: true, external: false, focusNewWindow:false }, options); var iOpenIndex = this._indexTabId(tabid); if (iOpenIndex >= 0 && !op.focusNewWindow) { @@ -2701,8 +2697,8 @@ var navTab = { tabid += Math.round(Math.random() * 10000000); } this._getPanels().eq(this._currentIndex).after(‘<div class="page unitBox"></div>’); this._getTabs().eq(this._currentIndex).after($(‘<li tabid="’ + tabid + '"><a href="javascript:;” class="close"><i class="icon-remove-sign"></i></a></li>’).attr('tabid’,tabid).append($(‘<a href="javascript:"></a>’).attr('title’,op.title).html(op.titleHtml))); this._getMoreLi().eq(this._currentIndex).after($(‘<li></li>’).append($(‘<a href="javascript:"></a>’).attr('title’,op.title).html(op.titleHtml))); this._getTabs().eq(this._currentIndex).after($('<li><a href="javascript:;” class="close"><i class="icon-remove-sign"></i></a></li>’).attr('tabid’,tabid).prepend($(‘<a href="javascript:"></a>’).attr('title’,op.title).text(op.title).prepend(op.icon))); this._getMoreLi().eq(this._currentIndex).after($(‘<li></li>’).append($(‘<a href="javascript:"></a>’).attr('title’,op.title).text(op.title).prepend(op.icon))); var $tabs = this._getTabs(); var $tab = $tabs.eq(this._currentIndex+1); var $panel = this._getPanels().eq(this._currentIndex+1); @@ -2992,7 +2988,7 @@ var navTab = { } if (op.fresh || url != dialog.data(“url”) ) { dialog.data("url", url); dialog.find(“.dialogHeader”).find(“h1”).html(title); dialog.find(“.dialogHeader”).find(“h1”).text(title); this.switchDialog(dialog); var jDContent = dialog.find(“.dialogContent”); jDContent.loadUrl(url, {}, function() { @@ -3018,7 +3014,7 @@ var navTab = { dialog.data("param", options.param); } ( $.fn.bgiframe && dialog.bgiframe() ); dialog.find(“.dialogHeader”).find(“h1”).html(title); dialog.find(“.dialogHeader”).find(“h1”).text(title); dialog.css("zIndex", ( $.pdialog._zIndex += 2 )); $.pdialog._init(dialog, options); dialog.click(function() {

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907