Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cross Site Scripting (XSS) - #56

Closed
frostnull opened this issue Oct 29, 2019 · 2 comments
Closed

Cross Site Scripting (XSS) - #56

frostnull opened this issue Oct 29, 2019 · 2 comments

Comments

@frostnull
Copy link

Describe the bug
XSS when a admin click on the link bellow, the g_preview_theme parameter not encoding the double quotes, an attacker could trick the admin to click on that link..
https://demo.gilacms.com/cm/edit_form/postcategory?id=8%22+%3E%3Cscript%3Ealert(1)%3C/script%3E

To Reproduce
Steps to reproduce the behavior:

  1. Go to 'https://demo.gilacms.com/admin/content/postcategory'
  2. Click on 'edit'
  3. With a web proxy like burp intercept that request, and after id= parameter put " "+><script>alert(1)</script>
  4. See the alert on browser..

Screenshots
If applicable, add screenshots to help explain your problem.

Desktop (please complete the following information):

  • Browser Firefox
  • Version 70.0 (64-bit)

Additional context
In fact the attacker could trick any admin to click on
https://demo.gilacms.com/cm/edit_form/postcategory?id=8%22+%3E%3Cscript%3Ealert(1)%3C/script%3E .. and execute javascript..

@frostnull
Copy link
Author

xss_gila_admin

@vzuburlis
Copy link
Member

Parameters g_preview_theme, t & id (from /cm/edit_form) are being sanitized in version 1.11.6

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants