漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Emlog: CSRF in Backend Upgrade Interface Leading to Arbitrary Remote SQL Execution and Arbitrary File Write
Vulnerability Description
Emlog is an open source website building system. Prior to version 2.6.8, the backend upgrade interface accepts remote SQL and ZIP URLs via GET parameters. The server first downloads and executes the SQL file, then downloads the ZIP file and extracts it directly into the web root directory. This process does not validate a CSRF token. Therefore, an attacker only needs to trick an authenticated administrator into visiting a malicious link to achieve arbitrary SQL execution and arbitrary file write. This issue has been patched in version 2.6.8.
CVSS Information
N/A
Vulnerability Type
跨站请求伪造(CSRF)
Vulnerability Title
emlog 跨站请求伪造漏洞
Vulnerability Description
emlog是emlog开源的一套基于PHP和MySQL的CMS建站系统。 Emlog 2.6.8之前版本存在跨站请求伪造漏洞,该漏洞源于后端升级接口未验证CSRF令牌,可能导致任意SQL执行和任意文件写入。
CVSS Information
N/A
Vulnerability Type
N/A