Persistent XSS, LFI & Open Redirect
Users can inject XSS payloads that will be saved to MySQL DB, where they will execute each time when accessed. 1- In Admin under 'Media Center' users can inject XSS payloads and save to the 'media_title' field for a saved media file, create a new media page inject payload click save and then select visualize. 2- Under Website menus area users can inject XSS payloads and save for the 'menu_title' field for a Website menu. We can directory traverse access and read files outside of the current working directory in the Admin area by abusing the 'tab' parameter. http://localhost/novius-os.5.0.1-elche/novius-os/admin/?tab=../../../../ http://localhost/novius-os.5.0.1-elche/novius-os/admin/nos/login?redirect= is open to abuse by supplying an malicious a location or file.