提出 #427091: Umbraco Umbraco CMS Version 12.3.6 Cross Site Scripting情報

タイトルUmbraco Umbraco CMS Version 12.3.6 Cross Site Scripting
説明While saving and previewing the content 'culture' parameter in file path /umbraco/preview/frame?id{}&culture=en-US is vulnerable to stored cross site scripting. Attack vector(s) 1. Login to the Umbraco dashboard with a user who have privilege to edit the website content. 2. Navigate to Content tab and click any one of the entries from content tab. 3. Click on "Save and preview," and a request will pass with the file path /umbraco/preview/frame?id{}&culture=en-US, Take the request to repeater. 4. Enter the payload "%22%3e%3cscript%3ealert(document.domain)%3c%2fscript%3e" in the culture parameter; it will redirect to the location as "../../{id}?culture="><script>alert(document.domian)</script>" with the 301 status code, simply follow the redirection. 5. A redirected request will send our payload and in response, we can see the executed payload.
ソース⚠️ https://owasp.org/www-community/attacks/xss/
ユーザー
 kushkira (UID 60170)
送信2024年10月20日 10:19 (1 年 ago)
モデレーション2024年11月03日 08:39 (14 days later)
ステータス承諾済み
VulDBエントリ282930 [Umbraco CMS 迄 10.7.7/12.3.6/13.5.2/14.3.1/15.1.1 Dashboard frame?id{} culture クロスサイトスクリプティング]
ポイント20

Do you know our Splunk app?

Download it now for free!