Date: Mon, 9 Oct 2017 19:51:02 +0200 From: chbi@...i.eu To: oss-security@...ts.openwall.com Subject: Re: Stored XSS vulnerability in BlogoText <= 3.7.5 FYI After further investigation, I've discovered that with this XSS vulnerability it is also possible, for an unauthenticated user, to upload a simple php web shell to execute code on the server. -- chbi https://chbi.eu GPG: 3DE9 9187 4BE9 EAE6 3CA8 DC20 BA7B 93F9 9037 AE7E https://chbi.eu/chbi.asc Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.