In RPCMS v1.8 and below, the "nickname" variable is not properly sanitized before being displayed on page. When the API functions are enabled, the attacker can use API to update user nickname with XSS payload and achieve stored XSS. Users who view the articles published by the injected user will trigger the XSS.
References
Link | Resource |
---|---|
https://github.com/ralap-z/RPCMS/ | Product |
https://gist.github.com/victomteng1997/bfa1e0e07dd22f7e0b13256eda79626f | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-07-26 11:15
Updated : 2021-08-06 09:21
NVD link : CVE-2021-37392
Mitre link : CVE-2021-37392
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
rpcms
- rpcms