In Bludit v1.5.2 and v2.0.1, an XSS vulnerability is located in the new page, new category, and edit post function body message context. Remote attackers are able to bypass the basic editor validation to trigger cross site scripting. The XSS is persistent and the request method to inject via editor is GET. To save the editor context, the followup POST method request must be processed to perform the attack via the application side. The basic validation of the editor does not allow injecting script codes and blocks the context. Attackers can inject the code by using an editor tag that is not recognized by the basic validation. Thus allows a restricted user account to inject malicious script code to perform a persistent attack against higher privilege web-application user accounts.
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16636
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16636
댓글 0
번호 | 제목 | 글쓴이 | 날짜 | 조회 수 |
---|---|---|---|---|
» | CVE-2017-16636 | 관리자 | 2017.11.09 | 39 |
376 | CVE-2017-14025 | 관리자 | 2017.11.09 | 32 |
375 | CVE-2017-16635 | 관리자 | 2017.11.09 | 28 |
374 | CVE-2017-14016 | 관리자 | 2017.11.09 | 36 |
373 | CVE-2017-15306 | 관리자 | 2017.11.09 | 27 |
372 | CVE-2015-7878 | 관리자 | 2017.11.09 | 27 |
371 | CVE-2017-15672 | 관리자 | 2017.11.09 | 39 |
370 | CVE-2015-7529 | 관리자 | 2017.11.09 | 29 |
369 | CVE-2017-11177 | 관리자 | 2017.11.09 | 29 |
368 | CVE-2017-7425 | 관리자 | 2017.11.09 | 29 |
367 | CVE-2017-16001 | 관리자 | 2017.11.09 | 24 |
366 | CVE-2017-16569 | 관리자 | 2017.11.09 | 18 |
365 | CVE-2017-15039 | 관리자 | 2017.11.09 | 24 |
364 | CVE-2017-16524 | 관리자 | 2017.11.09 | 34 |
363 | CVE-2017-16570 | 관리자 | 2017.11.09 | 34 |