vendor:
Charity Management System CMS
by:
Davide 't0rt3ll1n0' Taraschi
9,3
CVSS
HIGH
Unauthenticated reflected XSS, Authenticated stored XSS, POST Authenticated SQL Injection
79, 89, 89
CWE
Product Name: Charity Management System CMS
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux (Ubuntu 20.04)
2021
Exploit Title: Charity Management System CMS 1.0 – Multiple Vulnerabilities
The content of the 'search' variable is printed on the page without being checked, leading to XSS. There is a stored XSS in '/charity/admin/maintenance/manage_topic.php' due to a failure to sanitize user input. The $id variable is used without being checked, leading to SQLi.
Mitigation:
Input validation and sanitization should be used to prevent XSS and SQL injection attacks.