支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:736

73.6%
一、 漏洞 CVE-2025-70890 基础信息
漏洞信息
                                        # N/A

## 概述
Cyber Cafe Management System v1.0 存在存储型跨站脚本(XSS)漏洞。

## 影响版本  
Cyber Cafe Management System v1.0

## 细节  
攻击者在经过身份验证后,可通过 `add-users.php` 接口向 `username` 参数注入恶意 JavaScript 代码。该恶意载荷被服务器存储,并在受害者访问受影响页面时在浏览器中执行。

## 影响  
攻击者可利用该漏洞在受害者浏览器上下文中执行任意脚本,可能导致会话劫持、敏感信息泄露或恶意操作。
                                        
神龙判断

是否为 Web 类漏洞: 未知

判断理由:

N/A
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
N/A
来源:美国国家漏洞数据库 NVD
漏洞描述信息
A stored cross-site scripting (XSS) vulnerability exists in Cyber Cafe Management System v1.0. An authenticated attacker can inject arbitrary JavaScript code into the username parameter via the add-users.php endpoint. The injected payload is stored and executed in the victim s browser when the affected page is accessed.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
N/A
来源:美国国家漏洞数据库 NVD
漏洞标题
PHPGurukul Cyber Cafe Management System 安全漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
PHPGurukul Cyber Cafe Management System是PHPGurukul公司的一个网吧管理系统。 PHPGurukul Cyber Cafe Management System v1.0版本存在安全漏洞,该漏洞源于add-users.php端点的username参数未对输入进行充分处理,可能导致存储型跨站脚本攻击。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
其他
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2025-70890 的公开POC
#POC 描述源链接神龙链接
三、漏洞 CVE-2025-70890 的情报信息
  • 标题: Cyber Cafe Management System Using PHP & MySQL , Cyber Cafe Management System Project -- 🔗来源链接

    标签:

    Cyber Cafe Management System Using PHP & MySQL , Cyber Cafe Management System Project
  • 标题: Cyber-Cafe-Management-System-CVEs/CVE-2025-70890 at main · efekaanakkar/Cyber-Cafe-Management-System-CVEs · GitHub -- 🔗来源链接

    标签:

    神龙速读:
                                            ## 关键漏洞信息
    
    ### Description
    - **CVE ID**: CVE-2025-70890
    - **Vulnerability Type**: Stored Cross-Site Scripting (XSS)
    - **Description**: An authenticated attacker can exploit this vulnerability by submitting crafted input containing malicious JavaScript code via the `add-users.php` endpoint during the user creation process. The application fails to properly sanitize user-supplied input, allowing persistent storage and execution of malicious JavaScript code in the victim's browser.
    
    ### Affected Product
    - **Product**: Cyber Cafe Management System
    - **Vendor**: PHPGurukul
    - **Version**: v1.0
    
    ### Affected Component
    - **File**: add-users.php
    - **Parameter**: username
    - **Request Method**: POST
    
    ### Attack Vector
    - An authenticated attacker can exploit this vulnerability by submitting crafted input containing malicious JavaScript code via the `add-users.php` endpoint during the user creation process.
    
    ### Impact
    - Execution of arbitrary JavaScript code
    - Information disclosure
    - Potential session hijacking
    - Unauthorized actions performed in the context of authenticated users
    
    ### Proof of Concept
    - The issue was validated by injecting a JavaScript payload into the `username` parameter during user creation. When the list of users is accessed through the `view-allusers.php` endpoint, the stored payload is rendered and executed automatically in the victim's browser.
    
    ### Mitigation
    - Validate and sanitize all user-supplied input on the server side
    - Apply proper output encoding when rendering dynamic content
    - Implement a strict Content Security Policy (CSP)
    - Use secure input handling mechanisms and frameworks
    
    ### Discoverer
    - Efe Kaan AKKAR
                                            
    Cyber-Cafe-Management-System-CVEs/CVE-2025-70890 at main · efekaanakkar/Cyber-Cafe-Management-System-CVEs · GitHub
  • https://nvd.nist.gov/vuln/detail/CVE-2025-70890
四、漏洞 CVE-2025-70890 的评论

暂无评论


发表评论