By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Notification
Latest News
Twilio was hacked: Credentials stolen from Twilio employees.
August 10, 2022
Chinese hackers attack defense companies and government agencies in Russia and Eastern Europe
August 10, 2022
US authorities imposed sanctions on the cryptocurrency mixer Tornado Cash
August 10, 2022
Microsoft: Windows devices on new CPUs can corrupt data
August 10, 2022
Microsoft will improve the security of Edge when working with less popular sites
August 10, 2022
Aa
  • News
  • Security Insider
  • Tutorials
Reading: 3 XSS vulnerabilities can lead to a complete shutdown of the system
Share
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Aa
Search
  • News
  • Security Insider
  • Tutorials
Follow US
Security Parrot - Cyber Security News, Insights and Reviews > News > 3 XSS vulnerabilities can lead to a complete shutdown of the system
News

3 XSS vulnerabilities can lead to a complete shutdown of the system

Last updated: 2022/08/06 at 10:31 AM
Security Parrot Editorial Team Published August 6, 2022
Share
SHARE

Web development applications contain bugs that allow you to execute any command on the server.

Cybersecurity experts at PT Swarm have discovered 3 cross-site scripting (XSS) vulnerabilities in popular open-source applications that can cause remote code execution (RCE). Bugs are contained in the web development applications Evolution CMS, FUDForum and Gitbucket.

An XSS attack allows an attacker to run JavaScript code in the victim’s browser, which can steal cookies or redirect the user to a phishing site.

A bug in Evolution CMS V3.1.8 allows a hacker to launch a reflected (non-persistent) XSS attack in different places in the admin section. When attacking an administrator authorized in the system, the “index.php” file will be overwritten with the code that the cybercriminal placed in the payload.

The second vulnerability in FUDForum v3.1.1 allows a hacker to launch a persistent (stored) XSS attack. The FUDforum admin panel has a file manager that allows you to upload files to the server, including files with a PHP extension. An attacker can use persistent XSS to download a PHP file that can execute any command on the server.

A flaw in Gitbucket v4.37.1 could allow a hacker to launch a persistent XSS attack in various locations. A cybercriminal might try to use it to execute code on the server. In addition, the admin panel has tools for executing SQL queries to access the database.

GitBucket uses the H2 database engine by default. There is a public remote code execution exploit for this database. To carry out an attack, a hacker simply needs to create a PoC code based on this exploit, upload it to a repository and use it during the attack.

At the moment, information about the discovered vulnerabilities has been brought to the attention of users. Fixes are available in the official repositories applications:

Security Parrot Editorial Team August 6, 2022
Share this Article
Facebook Twitter Email Copy Link Print
What do you think?
Love0
Happy0
Joy0
Surprise0
Embarrass0
Sad0
Cry0
Angry0
Dead0

You Might Also Like

News

Twilio was hacked: Credentials stolen from Twilio employees.

August 10, 2022
News

Chinese hackers attack defense companies and government agencies in Russia and Eastern Europe

August 10, 2022
News

US authorities imposed sanctions on the cryptocurrency mixer Tornado Cash

August 10, 2022
News

Microsoft: Windows devices on new CPUs can corrupt data

August 10, 2022

© 2022 Parrot Media Network. All Rights Reserved.

  • Home
  • About Us
  • Contribute
  • Privacy Policy
  • Terms and Conditions

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?