Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The dynamic configuration feature in Xinha WYSIWYG editor 0.96 Beta 2 and earlier, as used in Serendipity 1.5.2 and earlier, allows remote attackers to bypass intended access restrictions and modify the configuration of arbitrary plugins via (1) crafted backend_config_secret_key_location and backend_config_hash parameters that are used in a SHA1 hash of a shared secret that can be known or externally influenced, which are not properly handled by the "Deprecated config passing" feature; or (2) crafted backend_data and backend_data[key_location] variables, which are not properly handled by the xinha_read_passed_data function. NOTE: this can be leveraged to upload and possibly execute arbitrary files via config.inc.php in the ImageManager plugin.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Xinha Serendipity Xinha WYSIWYG editor动态配置功能权限许可和访问控制漏洞
Vulnerability Description
Serendipity是一个采用PHP实现的 weblog/blog系统。它功能丰富,符合标准,基于BSDLicense开源。 Serendipity使用的Xinha WYSIWYG editor的动态配置功能存在漏洞,由于可知或可受外部影响的共享密钥的SHA1哈希所使用的特制 backend_config_secret_key_location和backend_config_hash参数无法被"deprecated config pass"特性正确处理,远程攻击者可通过(1)上述参数,或(2)xinha
CVSS Information
N/A
Vulnerability Type
N/A