漏洞标题
Flusity CMS posts.php loadPostAddForm 跨站脚本漏洞
漏洞描述信息
## 概述
在flusity CMS中发现的漏洞影响了`core/tools/posts.php`文件中的`loadPostAddForm`函数。该漏洞是由`edit_post_id`参数操纵导致的跨站脚本攻击(XSS)。该攻击可以远程发起,并且漏洞细节已公开,可能存在利用风险。
## 影响版本
由于flusity CMS采用滚动发布模式,无法提供具体受影响及更新版本的详细信息。
## 细节
该漏洞由`edit_post_id`参数的操纵引起,可能导致跨站脚本攻击(XSS)。漏洞修复补丁的标识符是`6943991c62ed87c7a57989a0cb7077316127def8`。该漏洞被分配了ID `VDB-243641`。
## 影响
攻击者可以远程利用该漏洞发起跨站脚本攻击,潜在威胁包括数据窃取和执行恶意脚本。建议应用补丁修复该问题。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
漏洞类别
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
漏洞标题
flusity CMS posts.php loadPostAddForm cross site scripting
漏洞描述信息
A vulnerability, which was classified as problematic, has been found in flusity CMS. This issue affects the function loadPostAddForm of the file core/tools/posts.php. The manipulation of the argument edit_post_id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The identifier of the patch is 6943991c62ed87c7a57989a0cb7077316127def8. It is recommended to apply a patch to fix this issue. The identifier VDB-243641 was assigned to this vulnerability.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
漏洞类别
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
漏洞标题
flusity CMS 跨站脚本漏洞
漏洞描述信息
flusity CMS是一个可以轻松更改或添加代码的用户交互界面解决方案。 Flusity CMS 存在安全漏洞,该漏洞源于 core/tools/posts.php 的 loadPostAddForm 函数中的参数 edit_post_id 会导致跨站点脚本编写。
CVSS信息
N/A
漏洞类别
跨站脚本