| Название | atjiu https://github.com/atjiu/pybbs <=6.0.0 Stored XSS |
|---|
| Описание | A normal user can inject malicious JavaScript code into database through profile modify function (endpoint /api/settings).
then the payloads will output without any encoding on the different web pages of both frontend and admin panel (endpoint /user/{username} and /admin/user/edit?id={uid}), thus trigger stored XSS,
due to the cookies' httpOnly is set to false, it allows attacker to steal normal users and administrator's cookies thus take over their accounts. |
|---|
| Источник | ⚠️ https://github.com/atjiu/pybbs/issues/209 |
|---|
| Пользователь | ZAST.AI (UID 87884) |
|---|
| Представление | 25.07.2025 09:56 (9 месяцы назад) |
|---|
| Модерация | 09.08.2025 14:35 (15 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 319341 [atjiu pybbs до 6.0.0 Admin Panel /api/settings межсайтовый скриптинг] |
|---|
| Баллы | 20 |
|---|