4images 跨站脚本漏洞
漏洞ID |
2391120 |
漏洞类型 |
跨站脚本 |
发布时间 |
2021-07-11 |
更新时间 |
2021-07-11 |
CVE编号 |
CVE-2021-27308 |
CNNVD-ID |
CNNVD-202103-1272 |
漏洞平台 |
N/A |
CVSS评分 |
N/A |
|漏洞详情
Piyush Patil 4images是 (Piyush Patil)开源的一个应用系统。一个图片管理系统。 4images version 1.8 存在跨站脚本漏洞,该漏洞允许远程攻击者可利用该漏洞通过“重定向”参数注入JavaScript。
|漏洞EXP
# Exploit Title: 4Images 1.8 - 'redirect' Reflected XSS
# Exploit Author: Piyush Patil
# Vendor Homepage: https://www.4homepages.de/
# Software Link: https://www.4homepages.de/?download=4images1.8.zip&code=81da0c7b5208e172ea83d879634f51d6
# Version: 4Images Gallery 1.8
# Tested on: Windows 10 and Kali
# CVE : CVE-2021-27308
-Description:
A cross-site scripting (XSS) vulnerability in the admin login panel in 4images version 1.8 allows remote attackers to inject JavaScript via the "redirect" parameter.
-Steps to reproduce:
1- Goto 4images admin panel page (demo instance: https://localhost/4images/admin/index.php)
2- Enter the credentials , Turn on the intercept and click on "Login"
3- copy paste the XSS payload after redirect=./../admin/index.php%3Fsessionid=xxxxxPASTEPAYLOADHERE
4-Forward the request and you can see XSS is triggered.
|参考资料
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2021-27308
本文由 华域联盟 原创撰写:华域联盟 » 4images 跨站脚本漏洞
转载请保留出处和原文链接:https://www.cnhackhy.com/89262.htm
本文来自网络,不代表华域联盟立场,转载请注明出处。