GetSimple CMS 3.3.7 Cross Site Scripting

2015.10.13
Credit: Joel V
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

#Date: 12/10/2015 #Discovered by: Joel Vadodil Varghese #Type of vulnerability: Reflected XSS #Tested on: Windows 8.1 #Product: GetSimple CMS #Version: 3.3.7 #Description: Application is vulnerable to Reflected XSS attack. There is a reflected XSS issue in the "uploads" section in version 3.3.7. When we pass the payload in the folder name section the payload gets executed and the folder gets created. Notified Vendor: October 12, 2015 Response: October 12, 2015 Closure of the security bug: Version 3.3.8 Reference: https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1103 (Vendor Confirmation) Thanks, Joel V


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top