漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
In Bludit v1.5.2 and v2.0.1, an XSS vulnerability is located in the new page, new category, and edit post function body message context. Remote attackers are able to bypass the basic editor validation to trigger cross site scripting. The XSS is persistent and the request method to inject via editor is GET. To save the editor context, the followup POST method request must be processed to perform the attack via the application side. The basic validation of the editor does not allow injecting script codes and blocks the context. Attackers can inject the code by using an editor tag that is not recognized by the basic validation. Thus allows a restricted user account to inject malicious script code to perform a persistent attack against higher privilege web-application user accounts.
漏洞信息
N/A
漏洞
N/A
漏洞
Bludit new page、new category和edit post function body message context 跨站请求伪造漏洞
漏洞信息
Bludit是一套开源免费的轻量级博客CMS(内容管理系统)系统。new page、new category和edit post function body message context都是其中的功能模块。new page是一个新页面添加模块。new category是一个新类别添加模块。 Bludit 1.5.2版本和2.0.1版本中的new page、new category和edit post function body message context中存在跨站请求伪造漏洞。远程攻击者可利用该漏洞
漏洞信息
N/A
漏洞
N/A