edit_requests.php in yTakkar Instagram-clone through 2018-04-23 has XSS via an onmouseover payload because of an inadequate XSS protection mechanism based on preg_replace.
References
Link | Resource |
---|---|
https://cxsecurity.com/issue/WLB-2018070095 | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/45003/ | Exploit Third Party Advisory VDB Entry |
https://cxsecurity.com/issue/WLB-2018070095 | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/45003/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://cxsecurity.com/issue/WLB-2018070095 - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/45003/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-07-10 18:29
Updated : 2024-11-21 03:48
NVD link : CVE-2018-13849
Mitre link : CVE-2018-13849
CVE.ORG link : CVE-2018-13849
JSON object : View
Products Affected
instagram-clone_project
- instagram-clone
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')