DotCMS 20.11 – Stored Cross-Site Scripting

  • 作者: Hardik Solanki
    日期: 2020-12-02
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/49168/
  • # Exploit Title: DotCMS 20.11 - Stored Cross-Site Scripting
    # Exploit Author: Hardik Solanki
    # Vendor Homepage: https://dotcms.com/
    # Version: 20.11
    # Tested on Windows 10
    
    Vulnerable Parameters: Template Title
    
    Steps to reproduce:
    1. Login With Admin Username and password.
    2. Navigate to Site --> Template --> Add Template Designer
    2. Entre the payload <script>alert(document.cookie)</script> in Template
    Title.
    3. Now Navigate to Site --> Template. We could see that our payload gets
    executed. And hence it executed every time.