POC详情: 6854282989aeb010386a9084487d16fafc6130ee

来源
关联漏洞
标题: JoomlaUX JUX Real Estate 代码注入漏洞 (CVE-2025-2127)
描述:JoomlaUX JUX Real Estate是JoomlaUX公司的一款 Joomla 组件,旨在满足多种房地产相关需求。 JoomlaUX JUX Real Estate 3.4.0版本存在代码注入漏洞,该漏洞源于对参数Itemid和jp_yearbuilt的错误操作会导致跨站脚本。
描述
A vulnerability was found in JoomlaUX JUX Real Estate 3.4.0 on Joomla. It has been classified as problematic. Affected is an unknown function of the file /extensions/realestate/index.php/properties/list/list-with-sidebar/realties. The manipulation of the argument Itemid/jp_yearbuilt leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
文件快照

id: CVE-2025-2127 info: name: JoomlaUX JUX Real Estate 3.4.0 - Reflected XSS author: 3th1c_yuk1 ...
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。