<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CVEs on Hack the Galaxy</title>
    <link>https://johnjhacking.com/categories/cves/</link>
    <description>Recent content in CVEs on Hack the Galaxy</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-gb</language>
    <lastBuildDate>Fri, 23 Oct 2020 18:00:00 +0000</lastBuildDate><atom:link href="https://johnjhacking.com/categories/cves/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>CVE-2020-27388: YOURLS 1.5 - 1.7.10, Multiple Stored Cross Site Scripting (XSS) Vulnerabilities in Admin Panel</title>
      <link>https://johnjhacking.com/blog/cve-2020-27388/</link>
      <pubDate>Fri, 23 Oct 2020 18:00:00 +0000</pubDate>
      
      <guid>https://johnjhacking.com/blog/cve-2020-27388/</guid>
      <description>Potential Abuse on a hooked Function There is a potential for abuse with any plugins that implement the hook function ‘shunt_is_valid_user’. In the code below we simply demonstrate that authentication can be completely bypassed by returning TRUE in the hooked function. This would be an ideal place for a stealthy backdoor or any other malicious code. It should be noted that this itself is not a vulnerability, but has a potential to be misused and plugins that use this hook should be checked.</description>
    </item>
    
  </channel>
</rss>
