[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Concrete CMS 9.2.7 Cross Site Scripting / Open Redirect Vulnerabilities

Author
Andrey Stoykov
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-39553
Category
web applications
Date add
12-04-2024
Platform
php
# Exploit Title: Multiple Web Flaws in concretecmsv9.2.7
# Exploit Author: Andrey Stoykov
# Version: 9.2.7
# Tested on: Ubuntu 22.04
# Blog: http://msecureltd.blogspot.com


Verbose Error Message - Stack Trace:

1. Directly browse to edit profile page
2. Error should come up with verbose stack trace

Verbose Error Message - SQL Error:

1. Page Settings > Design > Save Changes
2. Intercept HTTP POST request and place single quote to "pTemplateID"
3. Verbose SQL error message would occur

Open Redirect:

1. Login to application
2. Click to "Edit This Page" button
3. Intercept HTTP GET request
4. Enter relevant domain as value for "redirect" parameter

Stored XSS:

1. Edit page
2. Add HTML and drag it to the page
3. Add XSS payload

"><iframe src="data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==">

#  0day.today [2024-11-15]  #