header-logo
Suggest Exploit
vendor:
Kirby CMS
by:
Zaran Shaikh
3.1
CVSS
MEDIUM
Cross-Site Scripting
79
CWE
Product Name: Kirby CMS
Affected Version From: 2.5.12
Affected Version To: 2.5.12
Patch Exists: NO
Related CWE: NA
CPE: 2.5.12
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Web Application
2018

Kirby CMS 2.5.12 – Cross-Site Scripting

The application allows user injected payload which can lead to Stored Cross Site Scripting. Proof of Concept: Visit the application as low priv user, go to add page option, under title, enter any XSS payload like: <script>alert("XSS");</script> Upon the payload being injected, the subsequent page is triggered with XSS payload.

Mitigation:

Input validation and output encoding should be used to prevent XSS attacks.
Source

Exploit-DB raw data:

# Exploit Title:​​ Kirby CMS 2.5.12 - Cross-Site Scripting
# Date: 2018-07-22
# Exploit Author: Zaran Shaikh
# Version: ​2.5.12
# CVE :  ​NA
# Category: ​Web Application

# Description
# The application allows user injected payload which can lead to Stored
# Cross Site Scripting.

# Proof of Concept
# 1. Visit the application as low priv user
# 2. Go to add page option
# 3. Under title, enter any XSS payload like:

<script>alert("XSS");</script>

# 4. Upon the payload being injected, the subsequent page is triggered
# with XSS