SeedDMS < 5.1.11 - 'out.UsrMgr.php' Cross-Site Scripting

  • 作者: Nimit Jain
    日期: 2019-06-24
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/47023/
  • # Exploit Title: [Persistent Cross-Site Scripting or Stored XSS in out/out.UsrMgr.php in SeedDMS before 5.1.11]
    # Google Dork: [NA]
    # Date: [20-June-2019]
    # Exploit Author: [Nimit Jain](https://www.linkedin.com/in/nimitiitk)(https://secfolks.blogspot.com)
    # Vendor Homepage: [https://www.seeddms.org]
    # Software Link: [https://sourceforge.net/projects/seeddms/files/]
    # Version: [< 5.1.11] (REQUIRED)
    # Tested on: [NA]
    # CVE : [CVE-2019-12745]
    
    Proof-of-Concept:
    
    Step 1: Login to the application and go to My account and edit user details.
    Step 2: Change the name by adding <script>alert("name")</script> 
    Step 3: Now browse to user management option in Admin-tools and click on choose user to execute the previously inserted javascript.