An issue was discovered in BTITeam XBTIT. By using String.replace and eval, it is possible to bypass the includes/crk_protection.php anti-XSS mechanism that looks for a number of dangerous fingerprints.
References
Link | Resource |
---|---|
https://rastating.github.io/xbtit-multiple-vulnerabilities/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-09-05 21:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-15676
Mitre link : CVE-2018-15676
CVE.ORG link : CVE-2018-15676
JSON object : View
Products Affected
btiteam
- xbtit
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')