Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Store XSS in dotAdmin/#/c/c_Images on dotcms:21.05.1 #20540

Closed
r0ck3t1973 opened this issue Jun 15, 2021 · 2 comments
Closed

Store XSS in dotAdmin/#/c/c_Images on dotcms:21.05.1 #20540

r0ck3t1973 opened this issue Jun 15, 2021 · 2 comments

Comments

@r0ck3t1973
Copy link

Describe the bug
Hi Team
I found small a store xss in dotAdmin/#/c/c_Images
install: Docker: dotcms/dotcms:21.05.1

To Reproduce

  1. Login Admin panel
  2. Go to 'dotAdmin/#/c/c_Images'
  3. Click on 'Add new content'
  4. Parameter: 'Title' and 'Filename"
  5. Insert Payload Store XSS: " foo / bar"
  6. Click 'Choose File' and BOOM XSS
  7. Save and refersh store XSS

impact
Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site.

Screenshots
1
2
3
4
5
6
7

Desktop (please complete the following information):

  • OS: Win 10
  • Browser Chrome: Version 91.0.4472.77 (Official Build) (64-bit)
@wezell
Copy link
Contributor

wezell commented Jun 15, 2021

This is a known issue with some of the older admin screens and takes administrative access to exploit. Additionally, dotCMS does not allow http-referers from outside of the known list of sites that it serves, which prevents XSS vulnerabilities like these from being exploitable in the wild.

https://dotcms.com/security/SI-16

@wezell wezell closed this as completed Jun 15, 2021
@r0ck3t1973
Copy link
Author

CVE-2021-35358

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants