POC详情: 57eef3f5e5141950464f274e628cdb2a041e979a

来源
关联漏洞
标题: Flatpress 安全漏洞 (CVE-2024-25412)
描述:FlatPress是FlatPress社区的一个基于Php无需数据库支持的博客建站系统。 Flatpress v1.3版本存在安全漏洞,该漏洞源于存在跨站脚本(XSS)漏洞,允许攻击者通过向email字段注入精心设计的有效载荷来执行任意Web脚本或HTML。
描述
A cross-site scripting (XSS) vulnerability in Flatpress v1.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email field
介绍
# CVE-2024-25412
A cross-site scripting (XSS) vulnerability in Flatpress v1.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email field

Vulnerability Type:

Cross Site Scripting (XSS)

Vendor of Product:

https://github.com/flatpressblog/flatpress

Affected Product Code Base

Affected version :FlatPress 1.2.1 Latest - will be fixed in FlatPress version 1.3.

Affected Component:

Cross-Site Scripting (XSS) in FlatPress Installer (email parameter)

Attack Type:

Remote

Discoverer:

Parag Bagul

Reference:

https://portswigger.net/web-security/cross-site-scripting

https://drive.google.com/file/d/1GBL-iY5ZRaxRqLVqpBe1w6dVgEfywAG7/view?usp=sharing

Step to Reproduce:

1.Download the FlatPress CMS from a trustworthy source. (https://github.com/flatpressblog/flatpress)

2.Launch a local PHP server using the command: php -S 127.0.0.1:80

3.Open the following URL in your browser: https://127.0.0.1/setup.php

4. Within the **"email"** field, insert the subsequent payload. A pop-up displaying the number **"1"** will appear on the screen, confirming the successful execution of the payload. After that, proceed by clicking the **"Next"** button.

```html

"><img src=x onload=alert(1)> or "><script>alert(1)</script>
'''





文件快照

[4.0K] /data/pocs/57eef3f5e5141950464f274e628cdb2a041e979a ├── [128K] email_xss_poc.png ├── [114K] poc_popup_email_xss.png └── [1.3K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。