In RPCMS v1.8 and below, the "nickname" variable is not properly sanitized before being displayed on page. When the API functions are enabled, the attacker can use API to update user nickname with XSS payload and achieve stored XSS. Users who view the articles published by the injected user will trigger the XSS.
References
Link | Resource |
---|---|
https://gist.github.com/victomteng1997/bfa1e0e07dd22f7e0b13256eda79626f | Exploit Third Party Advisory |
https://github.com/ralap-z/RPCMS/ | Product |
Configurations
History
No history.
Information
Published : 2021-07-26 18:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-37392
Mitre link : CVE-2021-37392
CVE.ORG link : CVE-2021-37392
JSON object : View
Products Affected
rpcms
- rpcms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')