Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-15287 PoC — Dream Multimedia Dreambox设备BouquetEditor WebPlugin 跨站脚本漏洞

Source
Associated Vulnerability
Title:Dream Multimedia Dreambox设备BouquetEditor WebPlugin 跨站脚本漏洞 (CVE-2017-15287)
Description:Dream Multimedia Dreambox devices是德国Dream Multimedia公司生产的一款基于Linux的数字电视机顶盒。BouquetEditor WebPlugin是其中的一个具有频道命名、排序等功能的的插件。 Dream Multimedia Dreambox设备中的BouquetEditor WebPlugin存在跨站脚本漏洞。远程攻击者可利用该漏洞注入任意的Web脚本或HTML。
Description
Dream Multimedia Dreambox devices via their WebControl component are vulnerable to reflected cross-site scripting, as demonstrated by the "Name des Bouquets" field, or the file parameter to the /file URI.
File Snapshot

id: CVE-2017-15287 info: name: Dreambox WebControl 2.0.0 - Cross-Site Scripting author: pikpikc ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.