A vulnerability, classified as problematic, has been discovered in Mindskip xzs-mysql 学之思开源考试系统 3.9. (Open-Source Exam System). This issue affects an unknown function within the file /api/admin/question/edit of the Exam Edit Handler component. The manipulation of the 'title' and/or 'content' arguments can result in cross-site scripting (XSS). The attack can be launched remotely, and the exploit has been made public. Despite being notified, the vendor has not responded to the disclosure.
Exploit Details
The exploit has been made public and could potentially be used by malicious actors. The vulnerability exists due to improper handling of the 'title' and/or 'content' arguments in the /api/admin/question/edit file, leading to a cross-site scripting (XSS) attack. An attacker can execute arbitrary scripts in the context of the user's browser, potentially leading to unauthorized actions and the theft of sensitive information.
Here is a code snippet demonstrating the vulnerability
POST /api/admin/question/edit HTTP/1.1
Host: targetdomain
Content-Type: application/x-www-form-urlencoded
title=<script>alert('XSS')</script>&content=<script>alert('XSS')</script>
To exploit this vulnerability, the attacker must craft a malicious request that includes the 'title' and/or 'content' arguments combined with a payload containing arbitrary scripts, such as the example provided above.
Links to Original References
1. https://github.com/mindskip/xzs-mysql: The GitHub repository for the Mindskip xzs-mysql 学之思开源考试系统 3.9., where the affected source code can be found.
2. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1082: The MITRE Corporation's CVE Entry, detailing the vulnerability and its classification.
Potential Impact
If exploited, this vulnerability could allow an attacker to perform unauthorized actions on behalf of the user whose session has been compromised. This may include actions such as adding, modifying, or deleting content, as well as potentially gaining access to sensitive information. As the exploit has been made public, there is an increased risk of potential attacks.
Vendor Response
The vendor was contacted and informed about the vulnerability early in the disclosure process. However, they have not provided any response or taken any action to address the issue. It is advisable for users of the Mindskip xzs-mysql 学之思开源考试系统 3.9. to be aware of the vulnerability and take necessary precautions to mitigate the potential risk.
Conclusion
CVE-2025-1082 presents a problematic vulnerability in Mindskip xzs-mysql 学之思开源考试系统 3.9., which can result in cross-site scripting if left unaddressed. The exploit has been made public, increasing the potential risk for users. Despite the vendor's knowledge, no response or action has been taken to rectify the issue. Users should remain vigilant and take necessary precautions to protect their systems and information.
Timeline
Published on: 02/06/2025 23:15:08 UTC