tokenly / tokenly-cms

GNU General Public License v2.0
42 stars 12 forks source link

tokenly-cms – Cross-Site Scripting (XSS) in “list.php” #115

Open bestshow opened 7 years ago

bestshow commented 7 years ago

Product: tokenly-cms Download: https://github.com/tokenly/tokenly-cms Vunlerable Version: latest version Tested Version: latest version Author: ADLab of Venustech

Advisory Details: A Cross-Site Scripting (XSS) was discovered in “tokenly-cms latest version”, which can be exploited to execute arbitrary code. The vulnerability exist due to insufficient filtration of user-supplied data in the “q” HTTP GET parameter passed to the “tokenly-cms-master/slick/App/views/Profile/Members/list.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. The exploitation example below uses the "alert()" JavaScript function to see a pop-up messagebox: Poc: http://localhost/.../tokenly-cms-master/slick/App/views/Profile/Members/list.php?q=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22

bestshow commented 7 years ago

Excuse me, is there anyone dealing with this issue?