| Título | atjiu https://github.com/atjiu/pybbs <=6.0.0 Stored XSS |
|---|
| Descripción | A normal user can inject malicious JavaScript code into database through profile modify function (endpoint /api/settings).
then the payloads will output without any encoding on the different web pages of both frontend and admin panel (endpoint /user/{username} and /admin/user/edit?id={uid}), thus trigger stored XSS,
due to the cookies' httpOnly is set to false, it allows attacker to steal normal users and administrator's cookies thus take over their accounts. |
|---|
| Fuente | ⚠️ https://github.com/atjiu/pybbs/issues/209 |
|---|
| Usuario | ZAST.AI (UID 87884) |
|---|
| Sumisión | 2025-07-25 09:56 (hace 9 meses) |
|---|
| Moderación | 2025-08-09 14:35 (15 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 319341 [atjiu pybbs hasta 6.0.0 Admin Panel /api/settings secuencias de comandos en sitios cruzados] |
|---|
| Puntos | 20 |
|---|