We found results for “”
CVE-2021-43682
Good to know:
Date: December 2, 2021
thinkphp-bjyblog (last update Jun 4 2021) is affected by a Cross Site Scripting (XSS) vulnerability in AdminBaseController.class.php. The exit function terminates the script and prints a message to the user that contains $_SERVER['HTTP_HOST'].
Language: PHP
Severity Score
Severity Score
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-79Top Fix
Upgrade Version
Upgrade to version tiderjian/think-core - v11.33.4;tiderjian/think-core - dev-dependabot/npm_and_yarn/asset/libs/label-select/postcss-7.0.36;tiderjian/think-core - v13.0.0;tiderjian/think-core - v3.1.2;tiderjian/think-core - v12.0.0;tiderjian/think-core - v11.x-dev;tiderjian/think-core - v11.34.7;tiderjian/think-core - v8.0.4;tiderjian/think-core - v11.13.6;tiderjian/think-core - v12.0.8;tiderjian/think-core - v2.3.5;tiderjian/think-core - dev-dependabot/npm_and_yarn/asset/libs/label-select/ajv-6.12.6;tiderjian/think-core - v11.34.0;tiderjian/think-core - dev-dependabot/npm_and_yarn/asset/libs/label-select/tar-4.4.19;tiderjian/think-core - dev-dependabot/npm_and_yarn/asset/libs/label-select/ssri-6.0.2;tiderjian/think-core - v11.19.10;tiderjian/think-core - v11.34.3;tiderjian/think-core - v11.13.4;tiderjian/think-core - v8.0.1;tiderjian/think-core - v11.30.4;tiderjian/think-core - v11.30.0;tiderjian/think-core - v12.0.5;tiderjian/think-core - v7.2.0;tiderjian/think-core - v11.13.10;tiderjian/think-core - v7.0.1;lizongying/thinkphp-oauth - no_fix;tiderjian/qscmf - v2.0.0;stay-youbg/dome - no_fix;andyancn/xycheng - no_fix;goodspb/php-aerospike-admin - no_fix;biaoqianwo/cms - no_fix;biaoqianwo/cms - 1.0.0;paopao7/tp3_alipay_webpay - no_fix;buyplue/buyplus - no_fix;sqeven/sqeven - no_fix;kdf5000/easythink - no_fix;opjklu/framework - no_fix;cannon/thinkphp - no_fix;xiangziyfx/think - no_fix;lisifu/thinkphp3 - dev-patch-3;yixsu/dadamin - no_fix
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | CHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | LOW |
| Availability (A): | NONE |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | NETWORK |
| Access Complexity (AC): | MEDIUM |
| Authentication (AU): | NONE |
| Confidentiality (C): | NONE |
| Integrity (I): | PARTIAL |
| Availability (A): | NONE |
| Additional information: |
Vulnerabilities
Projects
Contact Us


