目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2024-25411 PoC — FlatPress 安全漏洞

来源
关联漏洞
标题:FlatPress 安全漏洞 (CVE-2024-25411)
Description:FlatPress是FlatPress社区的一个基于Php无需数据库支持的博客建站系统。 FlatPress v1.3版本存在安全漏洞,该漏洞源于存在跨站脚本(XSS)漏洞,允许攻击者通过向setup.php中的username参数注入精心设计的有效载荷来执行任意Web脚本或HTML。
Description
A cross-site scripting (XSS) vulnerability in Flatpress v1.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter in setup.php
介绍
# CVE-2024-25411
A cross-site scripting (XSS) vulnerability in Flatpress v1.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter in setup.php

 Vulnerability Type : Cross Site Scripting (XSS)

Vendor of Product : https://github.com/flatpressblog/flatpress

Affected Product Code Base: Affected version : FlatPress 1.2.1 Latest - will be fixed in FlatPress version 1.3.

Affected Component:
Cross-Site Scripting (XSS) in FlatPress Installer In username parameter

Attack Type: Remote

Reference:

https://portswigger.net/web-security/cross-site-scripting

https://github.com/flatpressblog/flatpress/pull/261

Discoverer:
Parag Bagul


Step to Reproduce:

1.Download FlatPress CMS from a trusted source.

2.Start a local PHP server using the command: php -S 127.0.0.1:80

3.Open the following URL in your browser: https://127.0.0.1/setup.php

4.In the "username" field, enter the following payload: 

```html
tes"><img src=x onload=alert(1)>

'''

5.Click on the "Next" button.

6.A pop-up with the number "1" will appear on the screen, indicating the successful execution of the payload.
文件快照

[4.0K] /data/pocs/d5c36c2ad7e1608e420407800b76ce3bddd18342 ├── [123K] flatpreess_username_parameter.png ├── [119K] payload_execute_poc.png └── [1.1K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
    3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →