Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XSS (Stored) in CuppaCMS #4

Open
security-breachlock opened this issue Aug 16, 2018 · 3 comments
Open

XSS (Stored) in CuppaCMS #4

security-breachlock opened this issue Aug 16, 2018 · 3 comments

Comments

@security-breachlock
Copy link

security-breachlock commented Aug 16, 2018

Affected software: CuppaCMS

Type of vulnerability: XSS (Stored)

Discovered by: BreachLock

Website: https://www.breachlock.com

Author: Balvinder Singh

Description: Stored attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information. Stored XSS is also sometimes referred to as Persistent or Type-I XSS.

Proof of concept:

Step1: Login to the cuppa cms.
Step2:URL:http://localhost/cuppa_cms/administrator/#/component/table_manager/view/cu_menus
Go to the section menus and click on add item, and name them with malicious javascript.
cuppa_1

Step3: Here the xss got executed.
cuppa_xss

@security-breachlock
Copy link
Author

Hi Team,

Any updates regarding the patches.

@tufik2
Copy link
Contributor

tufik2 commented Sep 3, 2018

Hi security-provensec, we will scape all string by default and will be ready in the next commit.

@NicoleG25
Copy link

Hi security-provensec, we will scape all string by default and will be ready in the next commit.

Was this issue ever fixed and if so in what commit ?
Please note that it seems CVE-2018-17300 was assigned to this issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants