# ExploitTitle:CiscoDigitalNetworkArchitectureCenter1.3.1.4-PersistentCross-SiteScripting
# Date:2020-04-16
# ExploitAuthor:DylanGarnaud&BenoitMalaboeuf-Pentesters from OrangeCyberdefenseFrance
# VendorHomepage: https://www.cisco.com/c/en/us/products/cloud-systems-management/dna-center/index.html
# Version:CiscoDNA before 1.3.0.6 and 1.3.1.4
# Tested on:1.3.0.2
# CVE:CVE-2019-15253
# Security advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190205-dnac-xss
## 1-NetworkHierarchy-Vulnerable parameter:FloorName.-Payload: ```<script>alert('XSS')</script>```
-Details:There is no control or security mechanism on thisfield. Specials characters are not encoded or filtered.-Privileges:Itrequiresadmin or customer account.-Location:Design->NetworkHirearchy->Building->Floor->Field:"Floor name".
## 2-UserManagement-Vulnerable parameters:FirstName,LastName.-Payload: ```<script>alert('XSS')</script>```
-Details:There is no control or security mechanism on thisfield. Specials characters are not encoded or filtered.-Privileges:Itrequiresadmin account.-Location:Settings->Users->UserManagement->Fields:"First Name" or "Last Name".