Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the keyword text field under the publish blog module.
References
| Link | Resource |
|---|---|
| https://github.com/jflyfox/jfinal_cms/issues/39 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/jflyfox/jfinal_cms/issues/39 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 07:07
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/jflyfox/jfinal_cms/issues/39 - Exploit, Issue Tracking, Third Party Advisory |
29 Jun 2022, 15:04
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 5.4 |
| CWE | CWE-79 | |
| CPE | cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:* | |
| References | (MISC) https://github.com/jflyfox/jfinal_cms/issues/39 - Exploit, Issue Tracking, Third Party Advisory |
23 Jun 2022, 17:19
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-06-23 17:15
Updated : 2024-11-21 07:07
NVD link : CVE-2022-33113
Mitre link : CVE-2022-33113
CVE.ORG link : CVE-2022-33113
JSON object : View
Products Affected
jflyfox
- jfinal_cms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
