Exploit/Advisories no image

Published on June 24th, 2023 📆 | 8308 Views ⚑

0

fastCMS Blogging 3.1.0 Cross Site Scripting – Torchsec


TTS

┌┌───────────────────────────────────────────────────────────────────────────────────────┐
││ C r a C k E r ┌┘
┌┘ T H E C R A C K O F E T E R N A L M I G H T ││
└───────────────────────────────────────────────────────────────────────────────────────┘┘

┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘ [ Vulnerability ] ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
: Author : CraCkEr :
│ Website : https://fastcms.net/ │
│ Vendor : fastCMS │
│ Software : fastCMS Blogging 3.1.0 │
│ Vuln Type: Stored XSS │
│ Impact : Manipulate the content of the site │
│ │
│────────────────────────────────────────────────────────────────────────────────────────│
│ ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
: :
│ Release Notes: │
│ ═════════════ │
│ Allow Attacker to inject malicious code into website, give ability to steal sensitive │
│ information, manipulate data, and launch additional attacks. │
│ │
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘ ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘

Greets:

The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09

CryptoJob (Twitter) twitter.com/0x0CryptoJob

┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘ © CraCkEr 2023 ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘

## Stored XSS

-----------------------------------------------
POST /demo/blog-post/599/how-to-choose-the-perfect-university-for-a-career-in-medicine/ HTTP/2





name=cracker&email=[anything]&website=[anything]&comment=[XSS Payload]&submit=
-----------------------------------------------

POST parameter 'comment' is vulnerable to XSS

## Steps to Reproduce:

1. Visit any [Categorie] (as Guest)
2. Scroll Down to [Leave a Reply]
3. Inject your [XSS Payload] in "Comments Window"
4. Press [Post Comment]

5. When the Admin Visit the [Comments] to Check [Pending Comments] on this Path (https://website/admin/modules/comments/comments.php?page=pending)
6. XSS will Fire & Executed on his Browser

[-] Done



Source link

Tagged with:



Comments are closed.