Exploit/Advisories no image

Published on March 4th, 2024 📆 | 4427 Views ⚑

0

BoidCMS 2.0.1 Cross Site Scripting – Torchsec


https://www.ispeech.org

# Exploit Title: Multiple XSS Issues in boidcmsv2.0.1
# Date: 3/2024
# Exploit Author: Andrey Stoykov
# Version: 2.0.1
# Tested on: Ubuntu 22.04
# Blog: http://msecureltd.blogspot.com

XSS via SVG File Upload

Steps to Reproduce:

1. Login with admin user
2. Visit "Media" page
3. Upload xss.svg
4. Click "View" and XSS payload will execute

// xss.svg contents


http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">

stroke="#004400"/>





Reflected XSS:

Steps to Reproduce:

1. Login as admin
2. Visit "Media" page
3. Click "Delete" and intercept the HTTP GET request
4. In "file" parameter add the payload ""
5. After forwarding the HTTP GET request a browser popup would surface

Stored XSS:

Steps to Reproduce:

1. Login as admin
2. Visit "Settings" page
3. Enter XSS payload in "Title", "Subtitle", "Footer"
4. Then visit the blog page

Source link

Tagged with:



Comments are closed.