You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description: Stored attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information. Stored XSS is also sometimes referred to as Persistent or Type-I XSS.
Proof of concept:
Step1: Login to the wonder cms.
Step2: URL: http://localhost/WonderCMS-2.5.2/wondercms/
Visit the URL and make a new page title with the description using the malicious javascript.
Step3: Here as the xss got executed for new page title parameter.
The text was updated successfully, but these errors were encountered:
This is considered SELF-XSS. In short, this is a feature which enables admins to post JavaScript anywhere, not just in the add page field.
A visitor can not execute JavaScript anywhere and the fields are sanitised from the visitor layer.
Please check #57 for more info, this has been reported a few times, you can also check the closed tickets.
Feel free to comment to keep the discussion going.
Additional note: this bug has been reported to Mitre and also been disputed. The admin can also not be tricked to post XSS via a malicious web site, as the admin is also protected by a CSRF token.
Affected software: WonderCMS-2.5.2
Type of vulnerability: XSS (Stored)
URL: : https://www.wondercms.com
Discovered by: Breachlock
Website: https://www.breachlock.com
Author: Balvinder Singh
Description: Stored attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information. Stored XSS is also sometimes referred to as Persistent or Type-I XSS.
Proof of concept:
Step1: Login to the wonder cms.
Step2: URL: http://localhost/WonderCMS-2.5.2/wondercms/
Visit the URL and make a new page title with the description using the malicious javascript.
Step3: Here as the xss got executed for new page title parameter.
The text was updated successfully, but these errors were encountered: