| Título | Umbraco Umbraco CMS Version 12.3.6 Cross Site Scripting |
|---|
| Descripción | While saving and previewing the content 'culture' parameter in file path /umbraco/preview/frame?id{}&culture=en-US is vulnerable to stored cross site scripting.
Attack vector(s)
1. Login to the Umbraco dashboard with a user who have privilege to edit the website content.
2. Navigate to Content tab and click any one of the entries from content tab.
3. Click on "Save and preview," and a request will pass with the file path /umbraco/preview/frame?id{}&culture=en-US, Take the request to repeater.
4. Enter the payload "%22%3e%3cscript%3ealert(document.domain)%3c%2fscript%3e" in the culture parameter; it will redirect to the location as "../../{id}?culture="><script>alert(document.domian)</script>" with the 301 status code, simply follow the redirection.
5. A redirected request will send our payload and in response, we can see the executed payload. |
|---|
| Fuente | ⚠️ https://owasp.org/www-community/attacks/xss/ |
|---|
| Usuario | kushkira (UID 60170) |
|---|
| Sumisión | 2024-10-20 10:19 (hace 1 Año) |
|---|
| Moderación | 2024-11-03 08:39 (14 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 282930 [Umbraco CMS hasta 10.7.7/12.3.6/13.5.2/14.3.1/15.1.1 Dashboard frame?id{} culture secuencias de comandos en sitios cruzados] |
|---|
| Puntos | 20 |
|---|