Advertisement






Support Ticket System CMS Webshell Upload& XSS

CVE Category Price Severity
CWE-74 Not specified High
Author Risk Exploitation Type Date
Not specified High Remote 2019-04-16
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H 0.02195 0.82118

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019040136

Below is a copy:

Support Ticket System CMS Webshell Upload& XSS
The Support Ticket System CMS have no input or file filters, so you can upload any PHP file u want + use input fields for XSS.
PoC: go to the demo website http://support.deadlockinfotech.com/login.php and press the Sign in button, then go to the settings page http://support.deadlockinfotech.com/settings.php. Here u can see many unfiltered input fields and one file upload field. Choose any PHP file (WebShell, uploader or something u want) and scroll down to Submit button. By default developer disabled this button, but u can submit this form via jQuery in Developers Console or just simply delete the disabled attribute from the <button> element (final result must be <button class="btn btn-bold btn-primary" name="update" type="submit">Update</button>), so this button will be enabled and u can now submit this form.
After that check out your avatar on the upper right corner and inspect this element in Console (uploaded PHP file will be inside this directory http://support.deadlockinfotech.com/assets/img/avatar/ ).

XSS is less interesting but still, u can put any code u want inside input fields and this code will work (Website name field data will work on each page u can go to) - no WAF or filtering over here, do whatever u want.

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum