Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-33209 PoC — FlatPress 安全漏洞

Source
Associated Vulnerability
Title:FlatPress 安全漏洞 (CVE-2024-33209)
Description:FlatPress是FlatPress社区的一个基于Php无需数据库支持的博客建站系统。 FlatPress v1.3版本存在安全漏洞。攻击者利用该漏洞可以将恶意JavaScript代码注入“Add New Entry”部分,从而在受害者的Web浏览器中执行任意代码。
Description
FlatPress 1.3. is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript code into the "Add New Entry" section, which allows them to execute arbitrary code in the context of a victim's web browser.
Readme
# CVE-2024-33209
FlatPress 1.3. is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript code into the "Add New Entry" section, which allows them to execute arbitrary code in the context of a victim's web browser.

Vulnerability Type:
Cross Site Scripting (XSS)

Vendor of Product :

flatpress CMS

Affected Product Code Base : 

Flatpress v1.3 - will be fixed in FlatPress version 1.3.

Affected Component

Add New Entry feature in admin panel

Attack Type:

Remote

Impact:
An attacker exploiting this vulnerability could inject malicious code into the FlatPress CMS, which could lead to various malicious activities such as stealing user session tokens, cookies, or other sensitive information. They can also modify the content of the webpage, redirect users to malicious websites, or perform actions on behalf of the victim.

Attack Vectors:

Attacker can send crafted link to victim.

Reference

https://owasp.org/www-community/attacks/xss/

Video POC:

https://drive.google.com/file/d/1AvPQszOimG8_zxiwoVnmeGGh8JY9J4IL/view

Discoverer:

Parag Bagul
File Snapshot

[4.0K] /data/pocs/5cd8ca8468634da695eec7bf16104b5f4eae384b └── [1.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.