Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

YXBOOKCMS Stored XSS #1

Open
PwnCYN opened this issue Oct 20, 2023 · 0 comments
Open

YXBOOKCMS Stored XSS #1

PwnCYN opened this issue Oct 20, 2023 · 0 comments

Comments

@PwnCYN
Copy link
Owner

PwnCYN commented Oct 20, 2023

Product Name:
YXBOOKCMS

Affect version:
1.0.2

Case Address:
https://down.chinaz.com/soft/37726.htm (Program download address)
https://www.ys-bs.com/ (The website address has been hacked)

Vulnerability Type:
Stored XSS

Description:
The library name can be modified in the general settings section of the backend homepage.
3

Due to the lack of filtering of input user content in the code, executable JavaScript code can be executed. As the modified part is the website title, the code will be triggered every time it is accessed, resulting in a storage based XSS vulnerability.
1
4
An attacker can write XSS statements to obtain user information (cookies, etc.) that visits the website.

@PwnCYN PwnCYN changed the title YXBOOKCMS Vulnerability Testing YXBOOKCMS Stored XSS Oct 20, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant