An issue was discovered in BTITeam XBTIT. By using String.replace and eval, it is possible to bypass the includes/crk_protection.php anti-XSS mechanism that looks for a number of dangerous fingerprints.
References
Link | Resource |
---|---|
https://rastating.github.io/xbtit-multiple-vulnerabilities/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-09-05T21:00:00
Updated: 2018-09-05T20:57:01
Reserved: 2018-08-21T00:00:00
Link: CVE-2018-15676
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-09-05T21:29:01.030
Modified: 2019-10-03T00:03:26.223
Link: CVE-2018-15676
JSON object: View
Redhat Information
No data.
CWE