跳转到帖子

Textpattern CMS 4.8.4 - 'Comments' Persistent Cross-Site Scripting (XSS)

recommended_posts

发布于
  • Members
# Exploit Title: Textpattern CMS 4.8.4 - 'Comments' Persistent Cross-Site Scripting (XSS)
# Date: 2021-03-04
# Exploit Author: Tushar Vaidya
# Vendor Homepage: https://textpattern.com
# Software Link: https://textpattern.com/start
# Version: v 4.8.4
# Tested on: Windows

Steps-To-Reproduce:
1. Login into Textpattern CMS admin panel.
2. Now go to the *Content > C**omments > Message*.
3. Now paste the below payload in the URL field.

Ba1man”><img src=x onerror=confirm(document.location)>

4. Now click on the *Save* button.
5. Now go to the https://site.com/articles/welcome-to-your-site#comments-head
5. The XSS will be triggered.
            
  • 查看数 696
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…