vendor:
Anchor CMS
by:
Ramazan Mert GÖKTEN
7.5
CVSS
HIGH
Stored Cross-Site Scripting
79
CWE
Product Name: Anchor CMS
Affected Version From: 0.12.7
Affected Version To: 0.12.7
Patch Exists: YES
Related CWE: N/A
CPE: a:anchorcms:anchor_cms:0.12.7
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 10
2021
Anchor CMS 0.12.7 – ‘markdown’ Stored Cross-Site Scripting
Exploitation of vulnerability as shown below; 1-) Entering the Admin Panel ( vulnerableapplication.com/anchor/admin ) 2-) Click Create a new post button at the Posts tab ( From "vulnerableapplication.com/anchor/admin/posts " to "vulnerableapplication.com/anchor/admin/posts/add " ) 3-) Relevant payload (<script>prompt("RMG_XSS_PoC")</script>) which was defined above entering the markdown parameter then click "save" button 4-) Finally, turn back the home page then shown the triggered vulnerability
Mitigation:
Input validation and output encoding should be used to prevent XSS attacks.