You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Content" feature.
To Reproduce
Steps to reproduce the behavior:
1, Login into the panel
2. Go to "mozilo2.0-master/admin/index.php?nojs=true&action=catpage&multi=true"
3. Click Edit "Content"
4. Insert Payload:
'><details/ open/ontoggle=confirm (document.domain)>
5. Save
6. Click Edit
7. XSS Alert Message
Expected behavior
The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page.
Screenshots
Infor moziloCMS Admin:
Go to "Content" and Edit:
Insert Payload XSS:
XSS Alert Message:
Desktop (please complete the following information):
OS: Windows
Browser Chorme
Version 85.0.4183.83 (Official Build) (64-bit)
The text was updated successfully, but these errors were encountered:
r0ck3t1973
changed the title
Cross Site Script Vulnerability on "content" in moziloCMS Admin
Cross Site Script Vulnerability on "content" in moziloCMS Admin 2.0 ("Amalia")
Sep 8, 2020
Describe the bug
An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Content" feature.
To Reproduce
Steps to reproduce the behavior:
1, Login into the panel
2. Go to "mozilo2.0-master/admin/index.php?nojs=true&action=catpage&multi=true"
3. Click Edit "Content"
4. Insert Payload:
'><details/ open/ontoggle=confirm (document.domain)>
5. Save
6. Click Edit
7. XSS Alert Message
Expected behavior
The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page.
Screenshots
Infor moziloCMS Admin:
Go to "Content" and Edit:
Insert Payload XSS:
XSS Alert Message:
Desktop (please complete the following information):
OS: Windows
Browser Chorme
Version 85.0.4183.83 (Official Build) (64-bit)
The text was updated successfully, but these errors were encountered: