Headline
CVE-2023-5835: UBB解析:修复4个空格或一个tab开头的markdown代码块解析时的XSS漏洞 · hu60t/hu60wap6@a1cd9f1
A vulnerability classified as problematic was found in hu60t hu60wap6. Affected by this vulnerability is the function markdown of the file src/class/ubbparser.php. The manipulation leads to cross site scripting. The attack can be launched remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named a1cd9f12d7687243bfcb7ce295665acb83b9174e. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-243775.
Commit
Permalink
Browse files
Browse the repository at this point in the history
UBB解析:修复4个空格或一个tab开头的markdown代码块解析时的XSS漏洞
案例:
<div class="topic-actions" data-v-38b8ba66=""> <!-- 打赏按钮 --> <form method="POST" action="reward.php" data-v-38b8ba66=""> <input type="hidden" name="post\_id" value="<?php echo $postId; ?>" data-v-38b8ba66=""> <input type="number" name="reward\_points" placeholder="请输入打赏积分数量" data-v-38b8ba66=""> <button type="submit" data-v-38b8ba66="">打赏</button> </form> </div>
旧版会让<input>直接以HTML显示出来,因为ubbparser认为它是代码块所以没有进行HTML转义,而Parsedown不认为它是代码块,因为<input>前面没有空行隔开。
- Loading branch information