header-logo
Suggest Exploit
vendor:
MiniCMS
by:
yudp
4.8
CVSS
MEDIUM
Stored XSS
79
CWE
Product Name: MiniCMS
Affected Version From: 1.10
Affected Version To: 1.10
Patch Exists: YES
Related CWE: CVE-2019-13339
CPE: a:bg5sbk:minicms:1.10
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: None
2019

MiniCMS 1.10 – ‘content box’ Stored XSS

A stored XSS vulnerability exists in MiniCMS 1.10. An attacker can inject malicious JavaScript code into the 'content box' of the page-edit page in /MiniCMS/mc-admin/page-edit.php. The malicious code is then executed when the page is viewed. An attacker can use Burp Suite to edit the payload and URL-encode the '+' character. When the page is viewed, a window will pop up with the domain.

Mitigation:

Input validation should be used to prevent malicious code from being injected into the 'content box'. Additionally, the application should be kept up to date with the latest security patches.
Source

Exploit-DB raw data:

# Exploit Title: MiniCMS 1.10 - 'content box' Stored XSS
# Date: 2019-7-4
# Exploit Author: yudp
# Vendor Homepage: https://github.com/bg5sbk/MiniCMS
# Software Link:https://github.com/bg5sbk/MiniCMS
# Version: 1.10
# CVE :CVE-2019-13339

Payload:<script>alert("3: "+document.domain)</script> In /MiniCMS/mc-admin/page-edit.php

POC:

1. Go to the page-edit page and input the payload into the content box ,click save button 
2.Use burpsuite to edit the payload. Pay attention that the “+” needs to be url-encoded
3.After that, go to the page we have saved
4.Window will pop with the domain