Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Insert Stored XSS in setting.php #1298

Closed
1130479816 opened this issue Sep 28, 2018 · 3 comments
Closed

Insert Stored XSS in setting.php #1298

1130479816 opened this issue Sep 28, 2018 · 3 comments
Labels
Milestone

Comments

@1130479816
Copy link

1130479816 commented Sep 28, 2018

Type of vulnerability: Stored XSS
Discovered by: iso60001
Description: Stored XSS attack is one of the three major categories of XSS attacks, the others being Non-Persistent (or Reflected) XSS and DOM-based XSS.
Step to reproduce the vulnerability:
1.Login the CMS.
2.Open Page http://10.10.10.174/GetSimpleCMS/admin/settings.php
3.Put XSS payload ("><svg/onload=alert(1)><") in the "Custom Permalink Structure" parameter and click on "Save Setting".

11

4.Open Page http://10.10.10.174/GetSimpleCMS/admin/edit.php
5.Put "www" in the title and body , click on "save page" to publish the page.

22

6.Finally , as shown in the figure.

33

7.Visit the page http://10.10.10.174/GetSimpleCMS/admin/pages.php

r qysl6z8 g b7 l tw8wl

@pale2hall
Copy link

Just to confirm, this issue requires the attacker to log into the CMS with valid administrator credentials, correct?

@fgeek
Copy link

fgeek commented Oct 1, 2018

CVE-2018-17835 has been assigned for this issue.

@tablatronix
Copy link
Member

I think this was fixed at some point

@tablatronix tablatronix added this to the 3.3.16 milestone May 24, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants