Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stored XSS - Nucleus CMS v3.71 #94

Open
security-breachlock opened this issue Jul 3, 2019 · 3 comments
Open

Stored XSS - Nucleus CMS v3.71 #94

security-breachlock opened this issue Jul 3, 2019 · 3 comments

Comments

@security-breachlock
Copy link

Description: The persistent (or stored) XSS vulnerability is a more devastating variant of a cross-site scripting flaw: it occurs when the data provided by the attacker is saved by the server, and then permanently displayed on "normal" pages returned to other users in the course of regular browsing, without proper HTML escaping. Stored attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information. Stored XSS is also sometimes referred to as Persistent or Type-I XSS.

Vulnerability Name: Persistent XSS

VulnerableURL:-
http://localhost/NucleusCMS-master/NucleusCMS-master/nucleus/bookmarklet.php?blogid=1

Discovered by: BreachLock

Website: https://www.breachlock.com

Author: Rahul Kumar Rai

Proof of concept:
Step1: Login into the Nucleus using the admin role.
Step2: Click on the “Add an item”.

image

Step3: Here we fill the “Title” and “Body” fields with XSS payload. Here it got executed because it is in “Auto Save now” mode. The relevant POC is attached here.

image

Here the “Title” field is vulnerable to XSS.

image

Here the “Body” field is vulnerable to XSS.
Step4: - Now, we will click on “Add Item” and then our item added successfully.

image

Step5: Click on the “Close Window” .After that click on the added Item, it is shown below.

image

Step 6: - Here same XSS got executed on My Nucleus CMS page.

image

image

@yama
Copy link
Contributor

yama commented Jul 3, 2019

ok, I will fix it later.

@security-breachlock
Copy link
Author

We would like to report this to CVE Mitre for registering it with a CVE ID.
Are you done with the patch for this vulnerability?

Looking forward to your response.

@security-breachlock
Copy link
Author

Any updates?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants