[CVE-2017-13778]Fiyo CMS 2.0.7 Storage XSS

Hello, I found that there are some problems with Fiyo CMS, hoping to help you and your work

dapurappsapp_configsys_config.php $_POST[site_name] variable exists Storage XSS vulnerability

125  if(isset($_POST['config_save'])) {
  126:     if(empty($_POST['site_name']) AND empty($_POST['site_title']) AND empty($_POST['site_url']) AND empty($_POST['site_status']) AND empty($_POST['site_title']) AND empty($_POST['file_allowed']) AND empty($_POST['file_size'])) 
  127      {    
  128          notice('error','invalid');
  ...
  161          * Query configuration
  162          */
  163:         $qr=$db->update(FDBPrefix."setting",array('value'=>"$_POST[site_name]"),"name='site_name'");    
  164          $qr=$db->update(FDBPrefix."setting",array('value'=>"$_POST[title]"),"name='site_title'");    
  165          $qr=$db->update(FDBPrefix."setting",array('value'=>"$_POST[url]"),"name='site_url'");

'$_POST[site_name]' is not filtered,and Write directly to the database

1.png

and then

dapurappsapp_configgeneral.php

29              <table>        
   30                  <tr>
   31:                     <td class="row-title"><span class="tips"  title="<?php echo Site_Name_tip; ?>" width="40%"> <?php echo Site_Name; ?></td>
   32:                     <td><input type="text" name="site_name" size="30" value="<?php echo siteConfig('site_name'); ?>" required></td>
   33                  </tr>

It does not do any filtering, directly the ’site_name‘ output page

So when i set the 'site_name' to xss payload,there is a storage xss

2.png

[Discoverer]
hi-building

Use CVE-2017-13778.

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值