Product: reasoncms
Download: https://github.com/reasoncms/reasoncms
Vunlerable Version: v4.7 and probably prior
Tested Version: v4.7
Author: ADLab of Venustech
Advisory Details:
A Cross-Site Scripting (XSS) was discovered in“reasoncms v4.7”, which can be exploited to execute arbitrary code.
The vulnerability exists due to insufficient filtration of user-supplied data in the “nyroModalSel” HTTP GET parameter passed to the “reasoncms-master/www/nyroModal/demoSent.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
The exploitation example below uses the "alert()" JavaScript function to see a pop-up messagebox:
Poc: http://localhost/.../reasoncms-master/www/nyroModal/demoSent.php?nyroModalSel=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22
The text was updated successfully, but these errors were encountered:
Product: reasoncms
Download: https://github.com/reasoncms/reasoncms
Vunlerable Version: v4.7 and probably prior
Tested Version: v4.7
Author: ADLab of Venustech
Advisory Details:
A Cross-Site Scripting (XSS) was discovered in“reasoncms v4.7”, which can be exploited to execute arbitrary code.
The vulnerability exists due to insufficient filtration of user-supplied data in the “nyroModalSel” HTTP GET parameter passed to the “reasoncms-master/www/nyroModal/demoSent.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
The exploitation example below uses the "alert()" JavaScript function to see a pop-up messagebox:
Poc:
http://localhost/.../reasoncms-master/www/nyroModal/demoSent.php?nyroModalSel=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22
The text was updated successfully, but these errors were encountered: