Wolf CMS 0.8.3.1 allows Cross-Site Scripting (XSS) attacks. The vulnerability exists due to insufficient sanitization of the file name in a "create-file-popup" action, and the directory name in a "create-directory-popup" action, in the HTTP POST method to the "/plugin/file_manager/" script (aka an /admin/plugin/file_manager/browse// URI).
References
Link | Resource |
---|---|
https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc | Exploit Third Party Advisory |
https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llcĀ - Exploit, Third Party Advisory |
Information
Published : 2017-09-08 10:29
Updated : 2024-11-21 03:08
NVD link : CVE-2017-11611
Mitre link : CVE-2017-11611
CVE.ORG link : CVE-2017-11611
JSON object : View
Products Affected
wolfcms
- wolf_cms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')