Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-12256 PoC — rConfig 跨站脚本漏洞

Source
Associated Vulnerability
Title:rConfig 跨站脚本漏洞 (CVE-2020-12256)
Description:rConfig是一款开源的网络配置管理实用程序。 rConfig 3.9.4版本中的devicemgmnt.php文件存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
Description
The rConfig 3.9.4 is vulnerable to cross-site scripting. The devicemgmnt.php file improperly validates the request coming from the user input. Due to this flaw, An attacker can exploit this vulnerability by crafting arbitrary javascript in `deviceId` GET parameter of devicemgmnt.php resulting in execution of the javascript.
File Snapshot

id: CVE-2020-12256 info: name: rConfig 3.9.4 - Cross-Site Scripting author: r3Y3r53 severity: ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.