First published: Thu Dec 02 2021(Updated: )
thinkphp-bjyblog (last update Jun 4 2021) is affected by a Cross Site Scripting (XSS) vulnerability in AdminBaseController.class.php. The exit function terminates the script and prints a message to the user that contains $_SERVER['HTTP_HOST'].
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thinkphp-bjyblog Project Thinkphp-bjyblog |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43682 is a Cross Site Scripting (XSS) vulnerability in thinkphp-bjyblog that affects the AdminBaseController.class.php file.
thinkphp-bjyblog is affected by CVE-2021-43682.
The severity of CVE-2021-43682 is medium with a severity value of 6.1.
CVE-2021-43682 exploits a Cross Site Scripting (XSS) vulnerability in thinkphp-bjyblog's AdminBaseController.class.php file, where the exit function terminates the script and displays a message containing $_SERVER['HTTP_HOST'] to the user.
At the moment, there is no official fix available for CVE-2021-43682. It is recommended to keep the software up to date and follow any patches or updates provided by the vendor.