monstra-cms / monstra

THIS PROJECT IS NOT SUPPORTED ANYMORE! Check FLEXTYPE.ORG
http://flextype.org
MIT License
396 stars 123 forks source link

Cross Site Script Vulnerability on "Page" in Monstra version 3.0.4 #463

Closed r0ck3t1973 closed 4 years ago

r0ck3t1973 commented 4 years ago

Hii, Team Monstra!!!

Describe the bug An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Page" feature.

To Reproduce Steps to reproduce the behavior:

  1. Login into the panel Monstra

  2. Go to 'admin/index.php'

  3. Click 'Create New' -> 'Page'

  4. Insert Payload XSS: "> '><details/open/ontoggle=confirm("XSS")> // # "><svg/onload=prompt(1337)> <svg/on

  5. Save and Exit

  6. Click 'Pages' new -> xss alert message!

Impact Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site.

Screenshots Infor Monstra version: info Ex1 payload xss: a. Creat new page: insert_payload1 b. click page: click_new_page c. xss alert mess: xss_mess

Desktop (please complete the following information): OS: Windows Browser: All Version:

I Hope you fix it ASAP!!!!

r0ck3t1973 commented 4 years ago

Alternatively, I can insert the payload into the item 'Metada' and 'Setting' Payload XSS: 'Metada' xss_payload2 Payload XSS: 'Setting' xss_payload3

r0ck3t1973 commented 3 years ago

CVE-2020-23697