header-logo
Suggest Exploit
vendor:
UNA
by:
Greg.Priest
4.8
CVSS
MEDIUM
Stored XSS Vulnerability
79
CWE
Product Name: UNA
Affected Version From: UNA - 10.0.0-RC1
Affected Version To: UNA - 10.0.0-RC1
Patch Exists: YES
Related CWE: CVE-2019-14804
CPE: unaio/una
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows/Linux
2019

UNA – 10.0.0-RC1 stored XSS vuln.

Sign in to admin and look for the etemplates page (/studio/polyglot.php?page=etemplates)! Click Emails and edit the templates! Inject the JavaScript code into the System Name field!

Mitigation:

Ensure that user input is properly sanitized and validated before being used in the application.
Source

Exploit-DB raw data:

# Exploit Title: [UNA - 10.0.0-RC1 stored XSS vuln.]
# Date: [2019 08 10]
# Exploit Author: [Greg.Priest]
# Vendor Homepage: [https://una.io/]
# Software Link: [https://github.com/unaio/una/tree/master/studio]
# Version: [UNA - 10.0.0-RC1]
# Tested on: [Windows/Linux ]
# CVE : [CVE-2019-14804]

UNA-v.10.0.0-RC1 [Stored XSS Vulnerability]#1

 Sign in to admin and look for the ["etemplates"] page (/studio/polyglot.php?page=etemplates)!
 Click ["Emails"] and edit the templates! Inject the JavaScript code into the ["System Name"] field!
 
 http://127.0.0.1/UNA/studio/polyglot.php?page=etemplates
 
https://github.com/Gr3gPr1est/BugReport/blob/master/CVE-2019-14804.pdf