Author
"Hardik Solanki"
Platform
multiple
Release date
2020-12-02
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 | # Exploit Title: DotCMS 20.11 - Stored Cross-Site Scripting # Exploit Author: Hardik Solanki # Vendor Homepage: https://dotcms.com/ # Version: 20.11 # Tested on Windows 10 Vulnerable Parameters: Template Title Steps to reproduce: 1. Login With Admin Username and password. 2. Navigate to Site --> Template --> Add Template Designer 2. Entre the payload <script>alert(document.cookie)</script> in Template Title. 3. Now Navigate to Site --> Template. We could see that our payload gets executed. And hence it executed every time. |
Release Date | Title | Type | Platform | Author |
---|---|---|---|---|
2020-12-02 | "DotCMS 20.11 - Stored Cross-Site Scripting" | webapps | multiple | "Hardik Solanki" |
2020-12-02 | "EgavilanMedia User Registration & Login System with Admin Panel 1.0 - CSRF" | webapps | multiple | "Hardik Solanki" |
import requests
response = requests.get('http://127.0.0.1:8181?format=json')
For full documentation follow the link above