Cms made simple 2.2.15 stored crosssite scripting via svg file upload (authenticated) Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2020-12-04 |
Type : webapps |
Platform : php
This exploit / vulnerability Cms made simple 2.2.15 stored crosssite scripting via svg file upload (authenticated) is for educational purposes only and if it is used you will do on your own risk!
Description
----------------------
CMS Made Simple 2.2.15 allows an authenticated user with access to the
Content Manager to edit content and put persistent XSS payload using the
malicious SVG file. The user can get cookies from every authenticated user
who visits the website.
Steps to reproduce
-------------------
1. Login into the cmsms admin panel using the admin user.
2. then go to content > file manager > images, now upload the malicious svg
(
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/XSS%20Injection/Files/SVG_XSS.svg)
file.
3. now open the svg file location (
http://127.0.0.1/cmsms/uploads//images/SVG_XSS.svg) and BOOM! you got the
popup.