漏洞概要

漏洞标题:
Xnami 1.0 – Cross-Site Scripting

提交时间:
2018-01-12

危害等级:

相关厂商:

漏洞分类:
exp公布

关注度:
共 33 人关注

漏洞详情

EDB-ID: 43535 Author: Dennis Veninga Published: 2018-01-12
CVE:
CVE-2018-5370
Type: Webapps Platform: PHP

E-DB Verified:
<a href="javascript:void(0);" data-trigger="focus" data-toggle="popover" data-placement="top" data-content='We make an effort to verify exploits (verifty) in our labs, when possible. A “non verified” exploit (marked by a clock icon clock) simply means we did not have the opportunity to test the exploit internally.’>
Waiting verification

Exploit:

Download Exploit Code Download

/

View Raw

Vulnerable App:
N/A
# Exploit Title: Xnami Image Sharing - Persistent XSS Vulnerability
# Google Dork: "  Copyright 2017 xnami. " & 2018
# Date: 11-01-2018
# Exploit Author: Dennis Veninga
# Contact Author: d.veninga [at] networking4all.com
# Vendor Homepage: bizlogicdev.com
# Version: 1.0
# CVE-ID: CVE-2018-5370

Xnami facilitates the creation of an image sharing community. This is
similar in
functionality to sites like imgur, ImageShack, et al.

BizLogic xnami 1.0 has XSS via the comment parameter in an addComment
action to the /media/ajax URI.

At any uploaded media there is a comment system where people can post (also
anonymous).
The comment system is vulnerable to XSS attacks. Since it's persistent
and there is an user login interface, it's possible for attackers to
steal sessions of users and thus admin(s).

---------------------------
---------------------------
PoC with mediaId 611 as example:

POST:
http://{{target}/media/ajax

method: addComment
comment: "><XSSCODE<
mediaId 611
---------------------------
---------------------------

Evil javascript code can be inserted and will be executed when visiting the
media.

发表评论

电子邮件地址不会被公开。 必填项已用*标注