header-logo
Suggest Exploit
vendor:
Clansphere CMS
by:
Sinem Sahin
8.8
CVSS
HIGH
Stored Cross-Site Scripting (XSS)
79
CWE
Product Name: Clansphere CMS
Affected Version From: 2011.4
Affected Version To: 2011.4
Patch Exists: NO
Related CWE:
CPE: a:clansphere:clansphere:2011.4
Metasploit:
Other Scripts:
Platforms Tested: Windows & XAMPP
2022

Clansphere CMS 2011.4 – Stored Cross-Site Scripting (XSS)

Clansphere CMS 2011.4 is vulnerable to stored cross-site scripting (XSS) attacks. An attacker can exploit this vulnerability by creating a malicious payload and entering it into the username field of the buddy list creation page. When a user visits the page, the malicious payload will be executed.

Mitigation:

To mitigate this vulnerability, users should ensure that all input is properly sanitized and validated before being used in the application.
Source

Exploit-DB raw data:

# Exploit Title: Clansphere CMS 2011.4 - Stored Cross-Site Scripting (XSS)
# Exploit Author: Sinem Şahin
# Date: 2022-10-08
# Vendor Homepage: https://www.csphere.eu/
# Version: 2011.4
# Tested on: Windows & XAMPP

==> Tutorial <==

1- Go to the following url. => http://(HOST)/index.php?mod=buddys&action=create&id=925872
2- Write XSS Payload into the username of the buddy list create.
3- Press "Save" button.

XSS Payload ==> "<script>alert("usernameXSS")</script> 

Link: https://github.com/sinemsahn/POC/blob/main/Create%20Clansphere%202011.4%20%22username%22%20xss.md