| عنوان | atjiu https://github.com/atjiu/pybbs <=6.0.0 Stored XSS |
|---|
| الوصف | A normal user can inject malicious JavaScript code into database through profile modify function (endpoint /api/settings).
then the payloads will output without any encoding on the different web pages of both frontend and admin panel (endpoint /user/{username} and /admin/user/edit?id={uid}), thus trigger stored XSS,
due to the cookies' httpOnly is set to false, it allows attacker to steal normal users and administrator's cookies thus take over their accounts. |
|---|
| المصدر | ⚠️ https://github.com/atjiu/pybbs/issues/209 |
|---|
| المستخدم | ZAST.AI (UID 87884) |
|---|
| ارسال | 25/07/2025 09:56 AM (9 أشهر منذ) |
|---|
| الاعتدال | 09/08/2025 02:35 PM (15 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 319341 [atjiu pybbs حتى 6.0.0 Admin Panel /api/settings البرمجة عبر المواقع] |
|---|
| النقاط | 20 |
|---|