Radiant CMS 1.1.3 – Mutiple Persistant XSS Vulnerabilities
Radiant is a no-fluff, open source content management system designed for small teams. It is vulnerable to multiple persistent XSS vulnerabilities. The attacker must first be a user of sorts, as there's only 2 types of roles 'administrator' & 'designer'. When uploading, the user is presented with the option to create a title for an image, which gets displayed back in the general repository. The attacker can input their own javascript within this field, thus when a user then visits the 'assets' page, they will be presented with a pop up. Additionally, when a user navigates to the 'Settings page', they can edit their Personal Preferences & Configuration. The attacker can input malicious javascript within the Name, Email Address, and Username fields, which will be reflected back to the admin when they visit the http://127.0.0.1/admin/users/ page.