A stored cross-site scripting (XSS) vulnerability exists in LightCMS that allows an user authorized to upload a malicious .pdf file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger a XSS attack.
login as admin in the article page
create a new article
upload the malicious pdf. the content of xss.pdf :
if it is possible,refer to https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload --- It is recommended that this practice be performed for all of the files that users need to download in all the modules that deal with a file download.currently we do this.
3.nginx detects the uploaded pdf and find the xss features such as 'app.alert(....)'.
A stored cross-site scripting (XSS) vulnerability exists in LightCMS that allows an user authorized to upload a malicious .pdf file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger a XSS attack.
The text was updated successfully, but these errors were encountered: