Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The $args variable in addons/mediapool/pages/index.php in REDAXO 5.6.2 is not effectively filtered, because names are not restricted (only values are restricted). The attacker can insert XSS payloads via an index.php?page=mediapool/media&opener_input_field=&args[ substring.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
REDAXO 跨站脚本漏洞
Vulnerability Description
REDAXO是一套开源的Web门户内容管理系统。该系统支持自定义模块、插件扩展、项目备份等。 REDAXO 5.6.2版本中的addons/mediapool/pages/index.php脚本中存在跨站脚本漏洞,该漏洞源于程序未有效地过滤index.php脚本中的$args变量。远程攻击者可借助index.php?page=mediapool/media&opener_input_field=&args[ substring利用该漏洞在用户的web浏览器中执行脚本。
CVSS Information
N/A
Vulnerability Type
N/A