目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2026-22675 — 神龙十问 AI 深度分析摘要

CVSS 5.4 · Medium

Q1这个漏洞是什么?(本质+后果)

- **CVE-2026-22675**: Stored XSS in OCS Inventory NG 🚨 - Affects v2.12.3 and earlier. - Malicious **JavaScript** stored & later executed. - 🎯 Unauth attackers may run scripts in victims' browsers.…

Q2根本原因?(CWE/缺陷点)

- **Root Cause**: Stored Cross-Site Scripting flaw 🔍 - Likely **CWE-79**: Improper neutralization of input during web page generation. - Input from **User-Agent** not sanitized properly.…

Q3影响谁?(版本/组件)

- **Affected Product**: OCS Inventory NG (open-source IT asset mgmt) 🖥️ - **Versions**: ≤ 2.12.3 - **Component**: Server side (storage of User-Agent).

Q4黑客能干啥?(权限/数据)

- Attackers need **low privileges** (PR:L) ✅ - Can execute **arbitrary JS** in other users' sessions. - 💥 May access sensitive info, modify UI, steal cookies/tokens.…

Q5利用门槛高吗?(认证/配置)

- **Exploitation threshold**: LOW ⚠️ - **Auth required**: Yes (PR:L = Low auth level). - Triggered via **User-Agent** header → stored → later rendered. - 🧩 No special config needed. Common web interaction (UI:R).

Q6有现成Exp吗?(PoC/在野利用)

- **Public PoC**: ❌ None listed in data 🔍 - `pocs` array is empty. - No sign of wild exploitation yet. - But risk remains due to ease of finding vector.

Q7怎么自查?(特征/扫描)

- **Self-check steps**: - 🔎 Review server logs for suspicious **User-Agent** strings. - Check stored inventory data for unexpected HTML/JS. - Use browser dev tools to inspect pages loading agent data.…

Q8官方修了吗?(补丁/缓解)

- **Official fix**: ✅ YES 🛡️ - Patch in commit `78faf2ca` (GitHub). - PR #483 tracks issue. - Update to patched version to remove vuln.

Q9没补丁咋办?(临时规避)

- **No patch workaround**: - Sanitize **User-Agent** before storing 🧼. - Encode output when rendering stored agent data. - Apply strict CSP headers 🚧 to block inline JS exec.…

Q10急不急?(优先级建议)

- **Urgency**: HIGH 🚨 - CVSS: AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N - Scope change (S:C) = impact beyond vulnerable component. - 💡 Fix ASAP if using ≤ v2.12.3. - Prevent session/data compromise.