| Titel | Umbraco Umbraco CMS Version 12.3.6 Cross Site Scripting |
|---|
| Beschreibung | While saving and previewing the content 'culture' parameter in file path /umbraco/preview/frame?id{}&culture=en-US is vulnerable to stored cross site scripting.
Attack vector(s)
1. Login to the Umbraco dashboard with a user who have privilege to edit the website content.
2. Navigate to Content tab and click any one of the entries from content tab.
3. Click on "Save and preview," and a request will pass with the file path /umbraco/preview/frame?id{}&culture=en-US, Take the request to repeater.
4. Enter the payload "%22%3e%3cscript%3ealert(document.domain)%3c%2fscript%3e" in the culture parameter; it will redirect to the location as "../../{id}?culture="><script>alert(document.domian)</script>" with the 301 status code, simply follow the redirection.
5. A redirected request will send our payload and in response, we can see the executed payload. |
|---|
| Quelle | ⚠️ https://owasp.org/www-community/attacks/xss/ |
|---|
| Benutzer | kushkira (UID 60170) |
|---|
| Einreichung | 20.10.2024 10:19 (vor 1 Jahr) |
|---|
| Moderieren | 03.11.2024 08:39 (14 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 282930 [Umbraco CMS bis 10.7.7/12.3.6/13.5.2/14.3.1/15.1.1 Dashboard frame?id{} culture Cross Site Scripting] |
|---|
| Punkte | 20 |
|---|