Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Persistent XSS on 'Website's name' field (config[site_from_name]) #154

Open
twoHub opened this issue Aug 20, 2018 · 0 comments
Open

Persistent XSS on 'Website's name' field (config[site_from_name]) #154

twoHub opened this issue Aug 20, 2018 · 0 comments

Comments

@twoHub
Copy link

twoHub commented Aug 20, 2018

Hey, guys, CMS's wonderful work! I found safety problems on the website in management settings:
A cross-site scripting (XSS) vulnerability stored in the "Site Name" field found in the "Contact" "Configuration" page of WistyCMS 0.6.2 allows remote attackers to inject arbitrary Web scripts or HTML through elaborate site names through HTTP requests authenticated with WITYCMS/Admin.

" onclick="alert(1)"
After saving the input JS code, the script is hidden in the tag attribute, and the script code is executed by clicking the input box.
Javascript gets executed. Here's an output of the mentioned payload when entered and saved.
default

If the data is not sanitized upon input, these components are going to return arbitrary web script or HTML that can be rendered by the browser .
【ZKZX-SHOWTIME】

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant