In YzmCMS 5.6, stored XSS exists via the common/static/plugin/ueditor/1.4.3.3/php/controller.php action parameter, which allows remote attackers to upload a swf file. The swf file can be injected with arbitrary web script or HTML.
References
Link | Resource |
---|---|
https://github.com/yzmcms/yzmcms/issues/45 | Exploit Third Party Advisory |
https://github.com/yzmcms/yzmcms/issues/45 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/yzmcms/yzmcms/issues/45 - Exploit, Third Party Advisory |
Information
Published : 2021-05-10 23:15
Updated : 2024-11-21 05:13
NVD link : CVE-2020-23370
Mitre link : CVE-2020-23370
CVE.ORG link : CVE-2020-23370
JSON object : View
Products Affected
yzmcms
- yzmcms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')