You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Vulnerability product: mipjz
Vulnerability version: 5.0.5
Source code link: https://github.com/sansanyun/mipjz/archive/refs/heads/master.zip
Vulnerability type: Storage XSS
Vulnerability details:
In the settingEdit method of the mipjz\app\setting\controller\ApiAdminSetting.php file, all passed values are assigned to $settingInfo, and the value of the ICP parameter is not filtered.
Vulnerability location:mipjz\app\setting\controller\ApiAdminSetting.php#settingEdit method
Vulnerability product: mipjz
Vulnerability version: 5.0.5
Source code link: https://github.com/sansanyun/mipjz/archive/refs/heads/master.zip
Vulnerability type: Storage XSS
Vulnerability details:
In the settingEdit method of the mipjz\app\setting\controller\ApiAdminSetting.php file, all passed values are assigned to $settingInfo, and the value of the ICP parameter is not filtered.
Vulnerability location:mipjz\app\setting\controller\ApiAdminSetting.php#settingEdit method
Vulnerability reproduction:
Background administrator rights
Open: http://192.168.0.105:82/index.php?s=/admin/#/setting/setting/
Insert
<img src oneror=alert (1)>
in the ICP filing number and click save now.Open again: http://192.168.0.105:82
pop-up notification
POC:
The text was updated successfully, but these errors were encountered: