Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7qfq-q2rc-5r96

Опубликовано: 22 мар. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

The wechat_return function in /controller/Index.php of EyouCms V1.5.4-UTF8-SP3 passes the user's input directly into the simplexml_ load_ String function, which itself does not prohibit external entities, triggering a XML external entity (XXE) injection vulnerability.

The wechat_return function in /controller/Index.php of EyouCms V1.5.4-UTF8-SP3 passes the user's input directly into the simplexml_ load_ String function, which itself does not prohibit external entities, triggering a XML external entity (XXE) injection vulnerability.

EPSS

Процентиль: 56%
0.00337
Низкий

7.2 High

CVSS3

Дефекты

CWE-611

Связанные уязвимости

CVSS3: 7.2
nvd
почти 4 года назад

The wechat_return function in /controller/Index.php of EyouCms V1.5.4-UTF8-SP3 passes the user's input directly into the simplexml_ load_ String function, which itself does not prohibit external entities, triggering a XML external entity (XXE) injection vulnerability.

EPSS

Процентиль: 56%
0.00337
Низкий

7.2 High

CVSS3

Дефекты

CWE-611