漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
WWBN AVideo has Stored XSS via Malicious EPG XML Program Titles in AVideo EPG Page
漏洞信息
WWBN AVideo is an open source video platform. In versions 26.0 and prior, AVideo's EPG (Electronic Program Guide) feature parses XML from user-controlled URLs and renders programme titles directly into HTML without any sanitization or escaping. A user with upload permission can set a video's epg_link to a malicious XML file whose <title> elements contain JavaScript. This payload executes in the browser of any unauthenticated visitor to the public EPG page, enabling session hijacking and account takeover.
漏洞信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
漏洞
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
漏洞
WWBN AVideo 跨站脚本漏洞
漏洞信息
WWBN AVideo是WWBN团队的一个由PHP编写的视频平台建站系统。 WWBN AVideo 26.0及之前版本存在跨站脚本漏洞,该漏洞源于EPG功能对用户控制的XML输入清理和转义不足,可能导致存储型跨站脚本攻击。
漏洞信息
N/A
漏洞
N/A