15 lines
No EOL
530 B
Text
15 lines
No EOL
530 B
Text
# Exploit Title: DotCMS 20.11 - Stored Cross-Site Scripting
|
|
# Exploit Author: Hardik Solanki
|
|
# Vendor Homepage: https://dotcms.com/
|
|
# Version: 20.11
|
|
# Tested on Windows 10
|
|
|
|
Vulnerable Parameters: Template Title
|
|
|
|
Steps to reproduce:
|
|
1. Login With Admin Username and password.
|
|
2. Navigate to Site --> Template --> Add Template Designer
|
|
2. Entre the payload <script>alert(document.cookie)</script> in Template
|
|
Title.
|
|
3. Now Navigate to Site --> Template. We could see that our payload gets
|
|
executed. And hence it executed every time. |