Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stored XSS in Pixelimity CMS #19

Open
security-breachlock opened this issue Nov 3, 2018 · 1 comment
Open

Stored XSS in Pixelimity CMS #19

security-breachlock opened this issue Nov 3, 2018 · 1 comment

Comments

@security-breachlock
Copy link

security-breachlock commented Nov 3, 2018

Affected software: Pixelimity CMS

Type of vulnerability: XSS (Stored XSS)

Discovered by: BreachLock

Website: https://www.breachlock.com

Author: Subodh Kumar

Description: Pixelimity CMS is prone to a Persistent Cross-Site Scripting attack that allows a malicious user to inject HTML or scripts that can access any cookies, session tokens, or other sensitive information retained by your browser and used with that site.

Vulnerable URL:
http://127.0.0.39/pixelimity/admin/portfolio.php

Vulnerable parameter:
Title

Proof of concept:

  1. Login as admin.

  2. Locate URL - http://127.0.0.39/pixelimity/admin/portfolio.php and click on "Add New"

  3. Put XSS payload in the "data[title]" parameter "></textarea><svg/onload=alert("XSS_By_Breachlock")> and click on "publish Portfolio."
    3 - Xss persistent - pixelimity - poc 1

  4. Visit the link - http://127.0.0.39/pixelimity/ to execute the payload.
    4 - Xss persistent - pixelimity - poc 2

@security-breachlock
Copy link
Author

Hi Team,

Any updates regarding the patches.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant