Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-3831 PoC — GNUBOARD5 跨站脚本漏洞

Source
Associated Vulnerability
Title:GNUBOARD5 跨站脚本漏洞 (CVE-2021-3831)
Description:GNUBOARD5是一套基于PHP和MySQL的Web论坛系统。 gnuboard5 存在跨站脚本漏洞,该漏洞源于在网页生成期间容易受到不正确输入的影响。
Description
Unauthenticated Sensitive Information Disclosure
Readme
# Improvements:
Encapsulation: Added a generateMd5 function to encapsulate the MD5 generation logic.
Main Function: Created executeExploit function to encapsulate the main logic, making the script more modular and readable.
Error Logging: Added error logging using error_log to capture any errors when fetching content from URLs.
Consistent Error Handling: Used consistent error handling to terminate execution if any step fails.
Comments and Readability: Improved comments and code structure for better readability and maintainability.
# Usage:
Save the Script: Save the enhanced code to a file, e.g., exploit.php.
Run the Script: Execute the script using PHP:
`
php exploit.php
`
# Further Steps:
Test the Script: Run the script in a controlled environment and verify the output.
Analyze Results: Examine the final response for any signs of vulnerability or sensitive information exposure.
Log Analysis: Check error logs if any issues arise during execution.
File Snapshot

[4.0K] /data/pocs/e4314a619410fb7bfa14fcd571dbe07b4ce44cd8 ├── [1.5K] exploit.php └── [ 960] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.