Skip to content
This repository has been archived by the owner on Jul 22, 2020. It is now read-only.

Stored XSS in Module name field #485

Open
AnusyaAngamuthu opened this issue May 30, 2018 · 1 comment
Open

Stored XSS in Module name field #485

AnusyaAngamuthu opened this issue May 30, 2018 · 1 comment

Comments

@AnusyaAngamuthu
Copy link

Stored XSS is found in the "Module name" field in CMS Clipper_1.3.3 version.The module name value is obtained from the user,it is getting saved and displayed without any sanitation.
Affected URL:
http://localhost/ClipperCMS-clipper_1.3.3/manager/
Steps to reproduce:
1.Under Modules choose Manage modules->edit
2.Enter the XSS payload in "Module name field and save it.
3.The script is getting executed and results in stored cross site scripting attack.
For your reference:
cmsclipper
xss alert
xss doc cookie
xss doc cookie1

Mitigation:
Strong Input validation has to be performed for all the entry points.Fully encode all dynamic data before embedding it in the web page. Encoding should be context-sensitive.
https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet

@fgeek
Copy link

fgeek commented Nov 12, 2018

CVE-2018-11572 has been assigned for this vulnerability.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants