Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-18268

EPSS 9.20% · P93
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-18268

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Open Redirect in Z-BlogPHP v1.5.2 and earlier allows remote attackers to obtain sensitive information via the "redirect" parameter in the component "zb_system/cmd.php."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Z-BlogPHP 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Z-BlogPHP是Z-blog社区的一套开源的基于PHP的博客系统。 Z-BlogPHP 存在输入验证错误漏洞,该漏洞源于Z-BlogPHP v1.5.2和更早版本中的Open Redirect在运行过程中存在配置等错误。攻击者可利用该漏洞通过组件“zb system cmd.php”中的“Redirect”参数获取敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-18268

#POC DescriptionSource LinkShenlong Link
1Z-Blog 1.5.2 and earlier contains an open redirect vulnerability via the redirect parameter in zb_system/cmd.php. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-18268.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-18268

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-06-07 · 22 CVEs total

CVE-2021-233917.3 HIGHArbitrary File Write via Archive Extraction (Zip Slip)
CVE-2020-363846.1 MEDIUMPageLayer 跨站脚本漏洞
CVE-2020-363836.1 MEDIUMPageLayer 跨站脚本漏洞
CVE-2020-36385Linux kernel 资源管理错误漏洞
CVE-2021-3277Nagios XI代码问题漏洞
CVE-2020-268852sic 2sxc 跨站脚本漏洞
CVE-2021-28382Zoho ManageEngine Key Manager Plus 6001 跨站脚本漏洞
CVE-2021-33904Accela Civic Platform 跨站脚本漏洞
CVE-2020-1719Red Hat Wildfly 安全漏洞
CVE-2021-33896Dino 路径遍历漏洞
CVE-2020-18264Simple-Log 跨站请求伪造漏洞
CVE-2020-18265Simple-Log 跨站请求伪造漏洞
CVE-2019-25045Linux kernel 资源管理错误漏洞
CVE-2020-36387Linux kernel 资源管理错误漏洞
CVE-2020-36386Linux kernel 缓冲区错误漏洞
CVE-2018-25015Linux kernel 资源管理错误漏洞
CVE-2020-1690OpenStack 安全漏洞
CVE-2020-1742Kubernetes 安全漏洞
CVE-2020-1750Red Hat OpenShift Container Platform 资源管理错误漏洞
CVE-2020-25716Red Hat CloudForms 安全漏洞

Showing top 20 of 22 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-18268

No comments yet


Leave a comment