漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Adobe Consulting Services Reflected Cross-Site Scripting Arbitrary Code Execution
Vulnerability Description
ACS Commons version 5.1.x (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in /apps/acs-commons/content/page-compare.html endpoint via the a and b GET parameters. User input submitted via these parameters is not validated or sanitised. An attacker must provide a link to someone with access to AEM Author, and could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. The exploitation of this issue requires user interaction in order to be successful.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
Adobe Acs-aem-commons 跨站脚本漏洞
Vulnerability Description
Adobe Acs-aem-commons是美国Adobe公司的一个基于Java的根据 AEM 生成的 AEM/CQ 代码集合的代码库。 Adobe Acs-aem-commons 5.1.x 及之前版本存在跨站脚本漏洞,该漏洞源于在 /apps/acs-commons/content/page-compare.html 端点中通过 a 和 b GET 参数存在反射跨站点脚本 (XSS)。攻击者利用此漏洞可将恶意 JavaScript 内容注入易受攻击的表单字段并在受害者浏览器的上下文中执行。
CVSS Information
N/A
Vulnerability Type
N/A