icon

We found results for “

CVE-2021-43682

Good to know:

icon

Date: December 2, 2021

thinkphp-bjyblog (last update Jun 4 2021) is affected by a Cross Site Scripting (XSS) vulnerability in AdminBaseController.class.php. The exit function terminates the script and prints a message to the user that contains $_SERVER['HTTP_HOST'].

Language: PHP

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-79

Top Fix

icon

Upgrade Version

Upgrade to version tiderjian/think-core - v11.33.4;tiderjian/think-core - dev-dependabot/npm_and_yarn/asset/libs/label-select/postcss-7.0.36;tiderjian/think-core - v13.0.0;tiderjian/think-core - v3.1.2;tiderjian/think-core - v12.0.0;tiderjian/think-core - v11.x-dev;tiderjian/think-core - v11.34.7;tiderjian/think-core - v8.0.4;tiderjian/think-core - v11.13.6;tiderjian/think-core - v12.0.8;tiderjian/think-core - v2.3.5;tiderjian/think-core - dev-dependabot/npm_and_yarn/asset/libs/label-select/ajv-6.12.6;tiderjian/think-core - v11.34.0;tiderjian/think-core - dev-dependabot/npm_and_yarn/asset/libs/label-select/tar-4.4.19;tiderjian/think-core - dev-dependabot/npm_and_yarn/asset/libs/label-select/ssri-6.0.2;tiderjian/think-core - v11.19.10;tiderjian/think-core - v11.34.3;tiderjian/think-core - v11.13.4;tiderjian/think-core - v8.0.1;tiderjian/think-core - v11.30.4;tiderjian/think-core - v11.30.0;tiderjian/think-core - v12.0.5;tiderjian/think-core - v7.2.0;tiderjian/think-core - v11.13.10;tiderjian/think-core - v7.0.1;lizongying/thinkphp-oauth - no_fix;tiderjian/qscmf - v2.0.0;stay-youbg/dome - no_fix;andyancn/xycheng - no_fix;goodspb/php-aerospike-admin - no_fix;biaoqianwo/cms - no_fix;biaoqianwo/cms - 1.0.0;paopao7/tp3_alipay_webpay - no_fix;buyplue/buyplus - no_fix;sqeven/sqeven - no_fix;kdf5000/easythink - no_fix;opjklu/framework - no_fix;cannon/thinkphp - no_fix;xiangziyfx/think - no_fix;lisifu/thinkphp3 - dev-patch-3;yixsu/dadamin - no_fix

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): CHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): NONE

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): MEDIUM
Authentication (AU): NONE
Confidentiality (C): NONE
Integrity (I): PARTIAL
Availability (A): NONE
Additional information:

Do you need more information?

Contact Us