header-logo
Suggest Exploit
vendor:
Subrion CMS
by:
icekam
6.1
CVSS
MEDIUM
Stored XSS
79
CWE
Product Name: Subrion CMS
Affected Version From: 4.2.1
Affected Version To: 4.2.1
Patch Exists: YES
Related CWE: CVE-2020-35437
CPE: a:intelliants:subrion
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: None
2020

Subrion CMS 4.2.1 – ‘avatar[path]’ XSS

A stored XSS vulnerability exists in the /_core/profile/ URL when the avatar[path] parameter is used in a POST request. The payload used is: '><sCrIpT>alert(1)</sCrIpT>

Mitigation:

Ensure that user input is properly sanitized and validated before being used in the application.
Source

Exploit-DB raw data:

# Exploit Title: Subrion CMS 4.2.1 - 'avatar[path]' XSS
# Date: 2020-12-15
# Exploit Author: icekam
# Vendor Homepage: https://subrion.org/ <https://www.icekam.com/>
# Software Link: https://github.com/intelliants/subrion
# Version: Subrion CMS 4.2.1
# CVE : CVE-2020-35437

stored xss vulnerability in /_core/profile/.
 Reproduce through the avatar[path] parameter in post /_core/profile/ url.
 payload:"><sCrIpT>alert(1)</sCrIpT>

https://github.com/intelliants/subrion/issues/880