FineCMS multi vulnerablity CVE-2017-11178,CVE-2017-11200,CVE-2017-11198,CVE-2017-11201,CVE-2017-11202

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

# Reflected XSS in get_image.php # ## Technical Description: ## file `/application/lib/ajax/get_image.php` the `$_POST['id']` and `$_POST['name']` and `$_GET['folder']` without any validated, sanitised or output encoded. ## Proof of Concept(PoC) ## ``` http://your_finecms/application/lib/ajax/get_image.php?folder=1 POST: id=1"><script>alert(1)</script>&name=1 ``` ![image.png-45.5kB][1] # Arbitrary File Modify # ## Technical Description: ## The base function for modify the template can modify the filename,this leads to the Arbitrary File Modify, who could allow attacker getshell. file `/appalication/core/controller/template.php` line50-line53 ![image.png-56.1kB][2] follow function save() file `/appalication/core/model/template.php` line26-line48 ![image.png-118.8kB][3] if file exists, we can modify it whihout any limit. insterestingly, there are two more Vulnerability for same function in different files. file `/appalication/core/model/style.php` line26-line48 ![image.png-97.3kB][4]...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息