ExploitTitle:StoredXSS
# Date:25-04-2019
# ExploitAuthor:DhirajMishra
# VendorHomepage: https://portals.apache.org/pluto
# SoftwareLink: https://portals.apache.org/pluto/download.html
# Version:3.0.0,3.0.1
# Tested on:Ubuntu16.04LTS
# CVE:CVE-2019-0186
# References:
# https://nvd.nist.gov/vuln/detail/CVE-2019-0186
# https://portals.apache.org/pluto/security.html
# https://www.inputzero.io/2019/04/apache-pluto-xss.html
Summary:The"Chat Room" portlet demo that ships withtheApachePlutoTomcat bundle
contains a Cross-SiteScripting(XSS)vulnerability. Specifically,if an
attacker can input raw HTML markup into the "Name" or "Message" input
fields and submits the form, then the inputted HTML markup will be embedded
in the subsequent web page.
Technical observation:-Start the ApachePlutoTomcat bundle
-Visit http://localhost:8080/pluto/portal/Chat%20Room%20Demo
-In the name field, enter:<input type="text" value="Name field XSS></input>-ClickSubmit-In the message field, enter:<input type="text" value="Message field XSS></input>Patch:3.0.x users should upgrade to3.1.0