Published on June 24th, 2023 📆 | 8308 Views ⚑
0fastCMS Blogging 3.1.0 Cross Site Scripting – Torchsec
││ C r a C k E r ┌┘
┌┘ T H E C R A C K O F E T E R N A L M I G H T ││
└───────────────────────────────────────────────────────────────────────────────────────┘┘
┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘ [ Vulnerability ] ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
: Author : CraCkEr :
│ Website : https://fastcms.net/ │
│ Vendor : fastCMS │
│ Software : fastCMS Blogging 3.1.0 │
│ Vuln Type: Stored XSS │
│ Impact : Manipulate the content of the site │
│ │
│────────────────────────────────────────────────────────────────────────────────────────│
│ ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
: :
│ Release Notes: │
│ ═════════════ │
│ Allow Attacker to inject malicious code into website, give ability to steal sensitive │
│ information, manipulate data, and launch additional attacks. │
│ │
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘ ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
Greets:
The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09
CryptoJob (Twitter) twitter.com/0x0CryptoJob
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘ © CraCkEr 2023 ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
## Stored XSS
-----------------------------------------------
POST /demo/blog-post/599/how-to-choose-the-perfect-university-for-a-career-in-medicine/ HTTP/2
name=cracker&email=[anything]&website=[anything]&comment=[XSS Payload]&submit=
-----------------------------------------------
POST parameter 'comment' is vulnerable to XSS
## Steps to Reproduce:
1. Visit any [Categorie] (as Guest)
2. Scroll Down to [Leave a Reply]
3. Inject your [XSS Payload] in "Comments Window"
4. Press [Post Comment]
5. When the Admin Visit the [Comments] to Check [Pending Comments] on this Path (https://website/admin/modules/comments/comments.php?page=pending)
6. XSS will Fire & Executed on his Browser
[-] Done
Gloss