|
Message-ID: <CALv8orHJWUHYVmSJ6KYKjhT_09_LFuYFtbdJj1gx87Gm0sp-+A@mail.gmail.com> Date: Sun, 5 May 2019 15:37:08 +0530 From: Pramod Rana <varchashva@...il.com> To: oss-security@...ts.openwall.com Subject: Cross Site Scripting | WolfCMS v0.8.3.1 and before Description: WolfCMS v0.8.3.1 and before is vulnerable to cross site scripting in User Add module for parameter Name. Impacted URL is http://[your_webserver_ip]/wolfcms/?/admin/user/add Payload used is "TestXSS><img src=x onmousover=alert(document.cookie)> Further details: https://github.com/wolfcms/wolfcms/issues/683 Already requested for CVE, yet to receive it.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.