Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w6f3-9fcw-hpgv

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

common/safety.php in Aztek Forum 4.00 allows remote attackers to enter certain data containing %22 sequences (URL encoded double quotes) and other potentially dangerous manipulations by sending a cookie, which bypasses the blacklist matching against the GET and PUT superglobal arrays.

common/safety.php in Aztek Forum 4.00 allows remote attackers to enter certain data containing %22 sequences (URL encoded double quotes) and other potentially dangerous manipulations by sending a cookie, which bypasses the blacklist matching against the GET and PUT superglobal arrays.

EPSS

Процентиль: 57%
0.00349
Низкий

Связанные уязвимости

nvd
около 19 лет назад

common/safety.php in Aztek Forum 4.00 allows remote attackers to enter certain data containing %22 sequences (URL encoded double quotes) and other potentially dangerous manipulations by sending a cookie, which bypasses the blacklist matching against the GET and PUT superglobal arrays.

EPSS

Процентиль: 57%
0.00349
Низкий