Enviar #427091: Umbraco Umbraco CMS Version 12.3.6 Cross Site Scriptinginformación

TítuloUmbraco Umbraco CMS Version 12.3.6 Cross Site Scripting
DescripciónWhile saving and previewing the content 'culture' parameter in file path /umbraco/preview/frame?id{}&culture=en-US is vulnerable to stored cross site scripting. Attack vector(s) 1. Login to the Umbraco dashboard with a user who have privilege to edit the website content. 2. Navigate to Content tab and click any one of the entries from content tab. 3. Click on "Save and preview," and a request will pass with the file path /umbraco/preview/frame?id{}&culture=en-US, Take the request to repeater. 4. Enter the payload "%22%3e%3cscript%3ealert(document.domain)%3c%2fscript%3e" in the culture parameter; it will redirect to the location as "../../{id}?culture="><script>alert(document.domian)</script>" with the 301 status code, simply follow the redirection. 5. A redirected request will send our payload and in response, we can see the executed payload.
Fuente⚠️ https://owasp.org/www-community/attacks/xss/
Usuario
 kushkira (UID 60170)
Sumisión2024-10-20 10:19 (hace 1 Año)
Moderación2024-11-03 08:39 (14 days later)
EstadoAceptado
Entrada de VulDB282930 [Umbraco CMS hasta 10.7.7/12.3.6/13.5.2/14.3.1/15.1.1 Dashboard frame?id{} culture secuencias de comandos en sitios cruzados]
Puntos20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!