Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SELF-XSS] (Stored) #68

Closed
security-breachlock opened this issue Aug 16, 2018 · 1 comment
Closed

[SELF-XSS] (Stored) #68

security-breachlock opened this issue Aug 16, 2018 · 1 comment

Comments

@security-breachlock
Copy link

security-breachlock commented Aug 16, 2018

Affected software: WonderCMS-2.5.2

Type of vulnerability: XSS (Stored)

URL: : https://www.wondercms.com

Discovered by: Breachlock

Website: https://www.breachlock.com

Author: Balvinder Singh

Description: Stored attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information. Stored XSS is also sometimes referred to as Persistent or Type-I XSS.

Proof of concept:

Step1: Login to the wonder cms.
Step2: URL: http://localhost/WonderCMS-2.5.2/wondercms/
Visit the URL and make a new page title with the description using the malicious javascript.

xss_parameterjpg

Step3: Here as the xss got executed for new page title parameter.
xss_executed_wonder

@robiso
Copy link
Collaborator

robiso commented Aug 17, 2018

Hi security-provensec.

This is considered SELF-XSS. In short, this is a feature which enables admins to post JavaScript anywhere, not just in the add page field.

A visitor can not execute JavaScript anywhere and the fields are sanitised from the visitor layer.

Please check #57 for more info, this has been reported a few times, you can also check the closed tickets.

Feel free to comment to keep the discussion going.

Additional note: this bug has been reported to Mitre and also been disputed. The admin can also not be tricked to post XSS via a malicious web site, as the admin is also protected by a CSRF token.

@robiso robiso closed this as completed Aug 17, 2018
@robiso robiso changed the title XSS (Stored) in WonderCMS-2.5.2 [SELF-XSS] (Stored) Aug 18, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants