PHPList 3.2.6 /lists/admin/ page Reflected Cross Site Scripting
| CVSS Meta Temp Score | Garga na exploit ndiyam (≈) | CTI Nganji Score |
|---|---|---|
| 5.1 | $0-$5k | 0.00 |
Gunduma
Gaskiya vulnerability da aka ware a matsayin karshewa an samu a PHPList 3.2.6. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /lists/admin/, a cikin sashen $software_component. A sa manipulation of the argument page with the input send\'\";><script>alert(8)</script> ka Cross Site Scripting (Reflected).
Wannan matsala ana saninta da CVE-2017-20033. Ngam yiɗi ka a tuma ndiyam ka internet. Babu exploit ɗin da ake samu.
Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a faggata.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Furɗe
Gaskiya vulnerability da aka ware a matsayin karshewa an samu a PHPList 3.2.6. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /lists/admin/, a cikin sashen $software_component. A sa manipulation of the argument page with the input send\'\";><script>alert(8)</script> ka Cross Site Scripting (Reflected). Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-80. Hakika, rauni an bayyana shi 03/17/2017 daga Tim Coen tare da Curesec Research Team kamar phplist 3.2.6: XSS kamar Mailinglist Post (Full-Disclosure). An raba bayanin tsaro don saukewa a seclists.org.
Wannan matsala ana saninta da CVE-2017-20033. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal faɗi ga. Shaharar wannan vulnerability ɗin ƙasa da matsakaici ne. Babu exploit ɗin da ake samu. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro.
Á sàmbu a wondi feere. 0-day shima, an ndiyam a wuro be $0-$5k.
Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a faggata.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Kayan
Nganji
Sunu
Furɗe
Laisens
CPE 2.3
CPE 2.2
CVSSv4
VulDB Furɗo: 🔍VulDB Gaskiya: 🔍
CVSSv3
VulDB Meta Base Score: 5.2VulDB Meta Temp Score: 5.1
VulDB Ganda Borno: 4.3
VulDB Temp Score: 4.0
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍
Ngamti Ganda Borno: 6.1
Ngamti Furɗo: 🔍
NVD Ganda Borno: 6.1
NVD Furɗo: 🔍
CNA Ganda Borno: 4.3
CNA Furɗo (VulDB): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vektar | Kumpleksiti | Authentisierung | Kariyandi | Gaskiya | Gashina |
|---|---|---|---|---|---|
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍
NVD Ganda Borno: 🔍
Gargajiya
Sunu: ReflectedKlasu: Cross Site Scripting / Reflected
CWE: CWE-80 / CWE-74 / CWE-707
CAPEC: 🔍
ATT&CK: 🔍
Fizikal: Ayi
Gumti: Ayi
Gana: Ee
Gashina: 🔍
Halitta: A wondi feere
EPSS Score: 🔍
EPSS Percentile: 🔍
Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍
| 0-Day | furu | furu | furu | furu |
|---|---|---|---|---|
| Lale | furu | furu | furu | furu |
Bayani na barazana
Ngam: 🔍Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍
Kari gamji
Garga: GargajiyaHalitta: 🔍
0-Day Gana: 🔍
Gargajiya: PHPList 3.3.1
Waktin layi
03/17/2017 🔍03/28/2017 🔍
10/01/2017 🔍
06/05/2022 🔍
11/22/2022 🔍
Ngizim
Gargaaji: phplist 3.2.6: XSSNgamti: Tim Coen
Kampani: Curesec Research Team
Halitta: A wondi feere
CVE: CVE-2017-20033 (🔍)
GCVE (CVE): GCVE-0-2017-20033
GCVE (VulDB): GCVE-100-98919
Gana kuma: 🔍
Gumti
Súgá: 03/28/2017 17:36Gargadi: 11/22/2022 11:44
Goyarwa: 03/28/2017 17:36 (54), 08/23/2020 09:49 (2), 06/05/2022 17:56 (3), 11/22/2022 11:29 (3), 11/22/2022 11:37 (27), 11/22/2022 11:44 (1)
Gadankam: 🔍
Cache ID: 253:EB8:103
A ga wuroyo kulu. Kàlàmbe: kr + en.
Ngam loga ka, kanyi shidin dum.