关联漏洞
描述
CVE-2024-27474, CVE-2024-27476, CVE-2024-27477
介绍
# Leantime-POC
CVE-2024-27474, CVE-2024-27476, CVE-2024-27477
## Description
The following vulnerabilities were identified in version 3.0.6 of the Leantime goals focused project management system.
### CVE-2024-27474
A cross-site request forgery (CSRF) vulnerability which, when triggered, would create and elevate the privileges of an account to the administrator role.
### CVE-2024-27476
An HTML injection vulnerability which allows an attacker to inject malicious HTML code, through href attribute or anchor tags, into the application. In my proof-of-concept (POC) I used this to redirect the "victim", otherwise known as myself, to an attacker-controlled login page where they may have their credentials stolen.
### CVE-2024-27477
A cross-site scripting (XSS) vulnerability, which, when triggered, issues a request to a remote server, performing a server-side request forgery attack. This could be leveraged to steal the cookies of any unsuspecting user who visits the page on which it is stored.
文件快照
[4.0K] /data/pocs/bca95a68f139c349c9915d85193fde2993a41202
├── [ 493] CVE-2024-27474.md
├── [ 747] CVE-2024-27476.md
├── [ 598] CVE-2024-27477.md
└── [1009] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。