0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Sitefinity CMS 9.2 - Cross-Site Scripting Vulnerability
# Exploit Title: Stored Cross Site Scripting (XSS) in Progress Sitefinity CMS 9.2 # Date: Aug 31, 2017 # Exploit Author: Pralhad Chaskar # Vendor Homepage: http://www.sitefinity.com/ # Tested on: Progress Sitefinity CMS 9.2 and lower # CVE : NA Vendor Description ------------------ Progress® Sitefinity™ is a content management and marketing analytics platform designed to maximize the agility needed to succeed in today’s rapidly changing digital marketplace. It provides developers and IT teams the tools they need to support enterprise-level digital marketing, optimizing the customer journey by delivering seamless personalized experiences across different technologies and devices. Progress is a trusted source for the digital marketing innovation needed to create transformative customer experiences that fuel business success. Description ------------ Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Vulnerability Class -------------------- Cross-site Scripting (XSS) - https://www.owasp.org/index.php/Cross-site_Scripting_(XSS) Proof of Concept ---------------- Below mentioned input fields aren't properly escaped. This could lead to an XSS attack that could possibly affect administrators, users, editor. http://xx.sitefinity.com/Sitefinity/Pages Parameter : Page Title Method: POST http://xx.sitefinity.com/Sitefinity/Content/News Parameter : News Title Method: POST http://xx.sitefinity.com/Sitefinity/Content/List Parameter : List Title Method: POST http://xx.sitefinity.com/Sitefinity/Content/Documents/LibraryDocuments/incident-request-attachments Parameter : Document Title Method: POST http://xx.sitefinity.com/Sitefinity/Content/Images/LibraryImages/newsimages Parameter : Image Title Method: POST http://xx.sitefinity.com/Sitefinity/Content/links Parameter : Link Title Method: POST http://xx.sitefinity.com/Sitefinity/Content/Videos/LibraryVideos/default-video-library Parameter : Video Title Method: POST Vendor Contact Timeline ------------------------ Discovered: October 16, 2016 Vendor Notification: October 18, 2016 Advisory Publication: Aug 31, 2017 Public Disclosure: Aug 31, 2017 Affected Targets ---------------- Sitefinity CMS 9.2 and lower Solution -------- Upgrade to Sitefinity CMS 10.1 to fix this issue. Credits ------- Pralhad Chaskar Information Security Analyst Help AG Middle East References ---------- [1] Help AG Middle East http://www.helpag.com/ [2] Sitefinity CMS Version Notes http://www.sitefinity.com/product/version-notes # 0day.today [2024-11-15] #