------------------ 原始邮件 ------------------
发件人: "Bas Steelooper"<notifications@github.com>;
发送时间: 2019年10月22日(星期二) 下午3:19
收件人: "pluck-cms/pluck"<pluck@noreply.github.com>;
抄送: "1113402387"<1113402387@qq.com>; "Author"<author@noreply.github.com>;
主题: Re: [pluck-cms/pluck] An issue was discovered in Pluck 4.7.10-dev2. There is a CSRF vulnerability that can editpage via a /admin.php?action=editpage (#81)
Have you retested with the latest dev version?
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub, or unsubscribe.
CSRF POC:
The text was updated successfully, but these errors were encountered: