Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

jizhicms v1.7.1 msg reflected xss vulnerability #28

Closed
mtfly opened this issue Jun 15, 2020 · 3 comments
Closed

jizhicms v1.7.1 msg reflected xss vulnerability #28

mtfly opened this issue Jun 15, 2020 · 3 comments

Comments

@mtfly
Copy link

mtfly commented Jun 15, 2020

A xss vulnerability was discovered in jizhicms 1.7.1

There is a reflected XSS vulnerability which allows remote attackers to inject arbitrary web script or HTML via the msg parameter of /index.php/Error/index?msg=1

Vulnerability file: Home/c/ErrorController.php

class ErrorController extends Controller
{
	//错误处理示例
	function index($msg){
		echo '错误信息提示:<br/>';	
		echo $msg;

    }
}

PoC:
http://example.com/index.php/Error/index?msg=%3Cscript%3Ealert(1)%3C/script%3E

image

@mtfly mtfly changed the title XSS vulnerability jizhicms v1.7.1 msg reflected xss vulnerability Jun 15, 2020
@Cherry-toto
Copy link
Owner

首先,请您阅读安装时的使用协议!
如果你没有注意,我下面给你列举出来:

II. 义务
本软件为开源软件,您可以在遵循本授权协议的基础上使用此版本软件。
不得对本软件或与之关联的商业授权进行出租、出售、抵押。
不得利用本软件参与重大国际、国家等重点项目,发生一切安全、产权、事故等纠纷均由使用者承担。
禁止在 极致CMS 的整体或任何部分基础上以发展任何衍生版本、修改版本或第三方版本用于重新分发。
禁止使用者在未经官方允许的情况下发布 极致CMS 相关安全漏洞信息,取得官方授权并在官方修复漏洞后,可发布相关漏洞信息。

其次,此XSS不会造成任何影响。

@OS-WS
Copy link

OS-WS commented Jan 12, 2021

HI, did you fix CVE-2020-23644 & CVE-2020-23643?
if so, in what commit?

thanks!

@Cherry-toto
Copy link
Owner

Cherry-toto commented Jan 14, 2021 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants