header-logo
Suggest Exploit
vendor:
Subrion CMS
by:
Zeel Chavda
6.1
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: Subrion CMS
Affected Version From: 4.2.1
Affected Version To: 4.2.1
Patch Exists: Yes
Related CWE: CVE-2018-14840
CPE: a:subrion:subrion:4.2.1
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows,FireFox
2018

Subrion CMS- 4.2.1 XSS (Using component with known Vulnerability)

An XSS vulnerability exists in Subrion CMS version 4.2.1 due to improper validation of user-supplied input. An attacker can exploit this vulnerability by creating a file with XSS payload, saving it with .html extension, and uploading it via CKEditor manager and executing the file.html.

Mitigation:

The vendor has released a patch to address this vulnerability. Users are advised to upgrade to the latest version of Subrion CMS.
Source

Exploit-DB raw data:

# Exploit Title: [Subrion CMS- 4.2.1 XSS (Using component with known
Vulnerability)]
# Date: [02-08-2018]
# Exploit Author: [Zeel Chavda]
# Vendor Homepage: [https://subrion.org/]
# Software Link: [https://subrion.org/download/]
# Version: [4.2.1] (REQUIRED)
# Tested on: [Windows,FireFox]
# CVE : [CVE-2018-14840]

Steps: -

1. Create a file with XSS payload.
2. Save it with .html extension.
3. Upload via CKEditor manager and execute "file.html".

Reference: -
https://github.com/intelliants/subrion/commit/cb10ac2294cb2c3a6d2159f9a2bb8c58a2a10a47