| 标题 | atjiu https://github.com/atjiu/pybbs <=6.0.0 Stored XSS |
|---|
| 描述 | A normal user can inject malicious JavaScript code into database through profile modify function (endpoint /api/settings).
then the payloads will output without any encoding on the different web pages of both frontend and admin panel (endpoint /user/{username} and /admin/user/edit?id={uid}), thus trigger stored XSS,
due to the cookies' httpOnly is set to false, it allows attacker to steal normal users and administrator's cookies thus take over their accounts. |
|---|
| 来源 | ⚠️ https://github.com/atjiu/pybbs/issues/209 |
|---|
| 用户 | ZAST.AI (UID 87884) |
|---|
| 提交 | 2025-07-25 09時56分 (9 月前) |
|---|
| 管理 | 2025-08-09 14時35分 (15 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 319341 [atjiu pybbs 直到 6.0.0 Admin Panel /api/settings 跨网站脚本] |
|---|
| 积分 | 20 |
|---|