| Título | Jinhe Jinhe OA V1.0 Basic Cross Site Scripting |
|---|
| Descripción | During the security review of "Jinhe OA (Jhsoft OA)",I discovered a critical reflected Cross-Site Scripting (XSS) vulnerability exists in the login!changePassWord.action endpoint of the OA system hosted at https://oa.iuoooo.com. The vulnerability arises due to insufficient input sanitization of the account parameter in POST requests. Malicious actors can inject arbitrary JavaScript payloads into this parameter; when the payload is reflected back in the server’s response, it executes in the context of the victim’s browser (triggered by user interaction like mouse hover). |
|---|
| Fuente | ⚠️ https://github.com/1276486/CVE/issues/4 |
|---|
| Usuario | Zre0x1c (UID 89206) |
|---|
| Sumisión | 2025-08-28 08:00 (hace 8 meses) |
|---|
| Moderación | 2025-09-03 13:28 (6 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 322333 [Jinher OA 1.0 POST Request login!changePassWord.action Cuenta secuencias de comandos en sitios cruzados] |
|---|
| Puntos | 20 |
|---|