
13 changes to exploits/shellcodes IDT PC Audio 1.0.6499.0 - 'STacSV' Unquoted Service Path Chromium 83 - Full CSP Bypass Wordpress Plugin Canto 1.3.0 - Blind SSRF (Unauthenticated) Composr CMS 10.0.34 - 'banners' Persistent Cross Site Scripting Phpscript-sgh 0.1.0 - Time Based Blind SQL Injection MiniCMS 1.10 - 'content box' Stored XSS Testa Online Test Management System 3.4.7 - 'q' SQL Injection Savsoft Quiz 5 - 'field_title' Stored Cross-Site Scripting Forma LMS 2.3 - 'First & Last Name' Stored Cross-Site Scripting Laravel Nova 3.7.0 - 'range' DoS CMS Made Simple 2.2.15 - Stored Cross-Site Scripting via SVG File Upload (Authenticated) Zabbix 5.0.0 - Stored XSS via URL Widget Iframe
16 lines
No EOL
611 B
Text
16 lines
No EOL
611 B
Text
# Exploit Title: MiniCMS 1.10 - 'content box' Stored XSS
|
||
# Date: 2019-7-4
|
||
# Exploit Author: yudp
|
||
# Vendor Homepage: https://github.com/bg5sbk/MiniCMS
|
||
# Software Link:https://github.com/bg5sbk/MiniCMS
|
||
# Version: 1.10
|
||
# CVE :CVE-2019-13339
|
||
|
||
Payload:<script>alert("3: "+document.domain)</script> In /MiniCMS/mc-admin/page-edit.php
|
||
|
||
POC:
|
||
|
||
1. Go to the page-edit page and input the payload into the content box ,click save button
|
||
2.Use burpsuite to edit the payload. Pay attention that the “+” needs to be url-encoded
|
||
3.After that, go to the page we have saved
|
||
4.Window will pop with the domain |