diff --git a/exploits/multiple/webapps/52035.txt b/exploits/multiple/webapps/52035.txt new file mode 100644 index 000000000..4b30fc5bf --- /dev/null +++ b/exploits/multiple/webapps/52035.txt @@ -0,0 +1,23 @@ +# Exploit Title: Sitefinity 15.0 - Cross-Site Scripting (XSS) +# Date: 2023-12-05 +# Exploit Author: Aldi Saputra Wahyudi +# Vendor Homepage: https://www.progress.com/sitefinity-cms +# Version: < 15.0.0 +# Tested on: Windows/Linux +# CVE : CVE-2023-27636 + +# Description: In the backend of the Sitefinity CMS, a Cross-site scripting vulnerability has been discovered in all features that use SF-Editor + +# Steps To Reproduce: + +Attacker as lower privilege +Victim as Higher privilege + +1. Login as an Attacker +2. Go to the function using the SF Editor, go to the news page as example +3. Create or Edit news item +4. On the content form, insert the XSS payload as HTML +5. After the payload is inserted, click on the content form (just click) and publish or save +6. If the victim visits the page with XSS payload, XSS will be triggered + +Payload: