MobileDetect 2.8.31 Example session_example.php initLayoutType $_SERVER['PHP_SELF'] क्रॉस साइट स्क्रिप्टिंग

एक कमकुवतपणा जो समस्याग्रस्त म्हणून वर्गीकृत केला आहे, तो MobileDetect 2.8.31 मध्ये आढळून आला आहे. या ठिकाणी परिणाम झाला आहे फंक्शन initLayoutType फाइल examples/session_example.php च्या घटक Example च्या. सॉफ्टवेअरमध्ये $_SERVER['PHP_SELF'] या आर्ग्युमेंटचे केलेली छेडछाड क्रॉस साइट स्क्रिप्टिंग निर्माण करते. समस्या जाहीर करण्यासाठी CWE वापरल्यास CWE-79 येथे नेले जाते. ही कमतरता प्रसिद्ध करण्यात आली होती 02/02/2023 म्हणून 741. डाउनलोडसाठी सल्ला github.com वर शेअर केला आहे. ही असुरक्षा CVE-2018-25080 म्हणून नोंदवली गेली आहे. दूरवरून हा हल्ला घडवून आणता येतो. तांत्रिक तपशील दिलेले आहेत. यासाठी एक एक्स्प्लॉइट उपलब्ध आहे. शोषण सार्वजनिकपणे जाहीर झाले आहे आणि त्याचा वापर होऊ शकतो. सध्या USD $0-$5k इतका असू शकतो. MITRE ATT&CK प्रकल्प T1059.007 हल्ला तंत्रज्ञान म्हणून घोषित करतो. प्रूफ-ऑफ-कॉन्सेप्ट म्हणून हे घोषित केले गेले आहे. डाउनलोडसाठी शोषण github.com वर उपलब्ध आहे. 0-डे म्हणून त्याची अंदाजे भूमिगत किंमत $0-$5k होती. आवृत्ती 2.8.32 वर अपग्रेड केल्यास ही समस्या दूर केली जाऊ शकते. github.com येथे अद्ययावत आवृत्ती डाउनलोड करण्यासाठी उपलब्ध आहे. 31818a441b095bdc4838602dbb17b8377d1e5cce हे पॅचचे नाव आहे. बगफिक्स github.com वर डाउनलोडसाठी तयार आहे. प्रभावित घटक अद्ययावत करणे आवश्यक आहे. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

6 बदल · 96 डेटा पॉइंट्स

शेतअद्ययावत 1/5
02/02/2023 09:19 PM
अद्ययावत 2/5
04/03/2023 09:23 AM
अद्ययावत 3/5
04/03/2023 09:25 AM
अद्ययावत 4/5
04/03/2023 09:27 AM
अद्ययावत 5/5
06/12/2025 01:18 AM
software_version2.8.312.8.312.8.312.8.312.8.31
software_componentExampleExampleExampleExampleExample
software_fileexamples/session_example.phpexamples/session_example.phpexamples/session_example.phpexamples/session_example.phpexamples/session_example.php
software_functioninitLayoutTypeinitLayoutTypeinitLayoutTypeinitLayoutTypeinitLayoutType
software_argument$_SERVER['PHP_SELF']$_SERVER['PHP_SELF']$_SERVER['PHP_SELF']$_SERVER['PHP_SELF']$_SERVER['PHP_SELF']
vulnerability_cweCWE-79 (क्रॉस साइट स्क्रिप्टिंग)CWE-79 (क्रॉस साइट स्क्रिप्टिंग)CWE-79 (क्रॉस साइट स्क्रिप्टिंग)CWE-79 (क्रॉस साइट स्क्रिप्टिंग)CWE-79 (क्रॉस साइट स्क्रिप्टिंग)
vulnerability_risk11111
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_uiRRRRR
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iLLLLL
cvss3_vuldb_aNNNNN
cvss3_vuldb_ePPPPP
cvss3_vuldb_rlOOOOO
cvss3_vuldb_rcCCCCC
advisory_identifier741741741741741
advisory_urlhttps://github.com/serbanghita/Mobile-Detect/pull/741https://github.com/serbanghita/Mobile-Detect/pull/741https://github.com/serbanghita/Mobile-Detect/pull/741https://github.com/serbanghita/Mobile-Detect/pull/741https://github.com/serbanghita/Mobile-Detect/pull/741
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://github.com/serbanghita/Mobile-Detect/pull/741https://github.com/serbanghita/Mobile-Detect/pull/741https://github.com/serbanghita/Mobile-Detect/pull/741https://github.com/serbanghita/Mobile-Detect/pull/741https://github.com/serbanghita/Mobile-Detect/pull/741
countermeasure_nameअपग्रेड कराअपग्रेड कराअपग्रेड कराअपग्रेड कराअपग्रेड करा
upgrade_version2.8.322.8.322.8.322.8.322.8.32
countermeasure_upgrade_urlhttps://github.com/serbanghita/Mobile-Detect/releases/tag/2.8.32https://github.com/serbanghita/Mobile-Detect/releases/tag/2.8.32https://github.com/serbanghita/Mobile-Detect/releases/tag/2.8.32https://github.com/serbanghita/Mobile-Detect/releases/tag/2.8.32https://github.com/serbanghita/Mobile-Detect/releases/tag/2.8.32
patch_name31818a441b095bdc4838602dbb17b8377d1e5cce31818a441b095bdc4838602dbb17b8377d1e5cce31818a441b095bdc4838602dbb17b8377d1e5cce31818a441b095bdc4838602dbb17b8377d1e5cce31818a441b095bdc4838602dbb17b8377d1e5cce
countermeasure_patch_urlhttps://github.com/serbanghita/Mobile-Detect/commit/31818a441b095bdc4838602dbb17b8377d1e5ccehttps://github.com/serbanghita/Mobile-Detect/commit/31818a441b095bdc4838602dbb17b8377d1e5ccehttps://github.com/serbanghita/Mobile-Detect/commit/31818a441b095bdc4838602dbb17b8377d1e5ccehttps://github.com/serbanghita/Mobile-Detect/commit/31818a441b095bdc4838602dbb17b8377d1e5ccehttps://github.com/serbanghita/Mobile-Detect/commit/31818a441b095bdc4838602dbb17b8377d1e5cce
countermeasure_advisoryquoteescaped PHP_SELFescaped PHP_SELFescaped PHP_SELFescaped PHP_SELFescaped PHP_SELF
source_cveCVE-2018-25080CVE-2018-25080CVE-2018-25080CVE-2018-25080CVE-2018-25080
cna_responsibleVulDBVulDBVulDBVulDBVulDB
advisory_date1675292400 (02/02/2023)1675292400 (02/02/2023)1675292400 (02/02/2023)1675292400 (02/02/2023)1675292400 (02/02/2023)
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiNNNNN
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcCCCCC
cvss2_vuldb_rlOFOFOFOFOF
cvss2_vuldb_auSSSSS
cvss3_vuldb_prLLLLL
cvss2_vuldb_basescore4.04.04.04.04.0
cvss2_vuldb_tempscore3.13.13.13.13.1
cvss3_vuldb_basescore3.53.53.53.53.5
cvss3_vuldb_tempscore3.23.23.23.23.2
cvss3_meta_basescore3.53.54.44.44.4
cvss3_meta_tempscore3.23.24.34.34.3
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
software_nameMobileDetectMobileDetectMobileDetectMobileDetectMobileDetect
cve_assigned1675292400 (02/02/2023)1675292400 (02/02/2023)1675292400 (02/02/2023)1675292400 (02/02/2023)
cve_nvd_summaryA vulnerability, which was classified as problematic, has been found in MobileDetect 2.8.31. This issue affects the function initLayoutType of the file examples/session_example.php of the component Example. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.8.32 is able to address this issue. The name of the patch is 31818a441b095bdc4838602dbb17b8377d1e5cce. It is recommended to upgrade the affected component. The identifier VDB-220061 was assigned to this vulnerability.A vulnerability, which was classified as problematic, has been found in MobileDetect 2.8.31. This issue affects the function initLayoutType of the file examples/session_example.php of the component Example. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.8.32 is able to address this issue. The name of the patch is 31818a441b095bdc4838602dbb17b8377d1e5cce. It is recommended to upgrade the affected component. The identifier VDB-220061 was assigned to this vulnerability.A vulnerability, which was classified as problematic, has been found in MobileDetect 2.8.31. This issue affects the function initLayoutType of the file examples/session_example.php of the component Example. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.8.32 is able to address this issue. The name of the patch is 31818a441b095bdc4838602dbb17b8377d1e5cce. It is recommended to upgrade the affected component. The identifier VDB-220061 was assigned to this vulnerability.A vulnerability, which was classified as problematic, has been found in MobileDetect 2.8.31. This issue affects the function initLayoutType of the file examples/session_example.php of the component Example. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.8.32 is able to address this issue. The name of the patch is 31818a441b095bdc4838602dbb17b8377d1e5cce. It is recommended to upgrade the affected component. The identifier VDB-220061 was assigned to this vulnerability.
cvss3_nvd_avNNN
cvss3_nvd_acLLL
cvss3_nvd_prNNN
cvss3_nvd_uiRRR
cvss3_nvd_sCCC
cvss3_nvd_cLLL
cvss3_nvd_iLLL
cvss3_nvd_aNNN
cvss2_nvd_avNNN
cvss2_nvd_acLLL
cvss2_nvd_auSSS
cvss2_nvd_ciNNN
cvss2_nvd_iiPPP
cvss2_nvd_aiNNN
cvss3_cna_avNNN
cvss3_cna_acLLL
cvss3_cna_prLLL
cvss3_cna_uiRRR
cvss3_cna_sUUU
cvss3_cna_cNNN
cvss3_cna_iLLL
cvss3_cna_aNNN
cve_cnaVulDBVulDBVulDB
cvss2_nvd_basescore4.04.04.0
cvss3_nvd_basescore6.16.16.1
cvss3_cna_basescore3.53.53.5
source_exploitdb52454
cvss4_vuldb_eP
cvss4_vuldb_avN
cvss4_vuldb_acL
cvss4_vuldb_prL
cvss4_vuldb_uiP
cvss4_vuldb_vcN
cvss4_vuldb_viL
cvss4_vuldb_vaN
cvss4_vuldb_atN
cvss4_vuldb_scN
cvss4_vuldb_siN
cvss4_vuldb_saN
cvss4_vuldb_bscore5.1
cvss4_vuldb_btscore2.0

Interested in the pricing of exploits?

See the underground prices here!