Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Session fixation vulnerability in WikyBlog 1.7.3 rc2 allows remote attackers to hijack web sessions by setting the jsessionid parameter to (1) index.php/Comment/Main, (2) index.php/Comment/Main/Home_Wiky, or (3) index.php/Edit/Main.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
WikyBlog会话劫持漏洞
Vulnerability Description
WikyBlog是一款采用PHP和MySQL开发的Bliki CMS(即wiki+blog的内容管理系统),并且利用了AJAX强化的构造。该系统支持UTF-8字符集,拥有强大的可扩展性(如google map等)。 WikyBlog 存在会话固定漏洞。远程攻击者可以借助设置脚本(1) index.php/Comment/Main, (2) index.php/Comment/Main/Home_Wiky, 或 (3) index.php/Edit/Main的jsessionid参数,挟持网络会话。
CVSS Information
N/A
Vulnerability Type
N/A