EmpireCMS 7.5.0 has XSS via the from parameter to e/member/doaction.php, as demonstrated by a CSRF payload that changes the dynamic page template. The attacker can choose to resend the e/template/member/regsend.php registered activation mail page.
References
Link | Resource |
---|---|
https://github.com/coolboy0816/audit/issues/3 | Exploit Third Party Advisory |
https://github.com/coolboy0816/audit/issues/3 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/coolboy0816/audit/issues/3 - Exploit, Third Party Advisory |
Information
Published : 2019-05-27 23:29
Updated : 2024-11-21 04:22
NVD link : CVE-2019-12361
Mitre link : CVE-2019-12361
CVE.ORG link : CVE-2019-12361
JSON object : View
Products Affected
phome
- empirecms