漏洞标题
playSMS SMS Schedule 网站跨站点脚本
漏洞描述信息
在up to 1.4.7版本的playSMS中发现了一个被归类为问题的漏洞。受影响的是组件SMS调度处理程序中的未知函数,文件路径为/index.php?app=main&inc=feature_schedule&op=list。通过操作参数名称/消息,可以导致基本的跨站脚本。攻击可以在远程环境下执行。升级到版本1.4.8可以解决此问题。该补丁的名称是7a88920f6b536c6a91512e739bcb4e8adefeed2b。建议升级受影响的组件。该漏洞的标识为VDB-267912。需要注意的是,代码维护者在披露此问题早期就被联系,并积极准备尽快修复。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
漏洞类别
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
漏洞标题
playSMS SMS Schedule cross site scripting
漏洞描述信息
A vulnerability classified as problematic has been found in playSMS up to 1.4.7. Affected is an unknown function of the file /index.php?app=main&inc=feature_schedule&op=list of the component SMS Schedule Handler. The manipulation of the argument name/message leads to basic cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.4.8 is able to address this issue. The name of the patch is 7a88920f6b536c6a91512e739bcb4e8adefeed2b. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-267912. NOTE: The code maintainer was contacted early about this disclosure and was eager to prepare a fix as quickly as possible.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
漏洞类别
Web页面中脚本相关HTML标签转义处理不恰当(基本跨站脚本)
漏洞标题
playSMS 安全漏洞
漏洞描述信息
playSMS是印度Anton Raharja个人开发者的一套开源的SMS(短信息服务)管理软件。 playSMS 1.4.7及之前版本存在安全漏洞,该漏洞源于对参数name/message的操作会导致基本的跨站脚本攻击。
CVSS信息
N/A
漏洞类别
其他