Submit #427091: Umbraco Umbraco CMS Version 12.3.6 Cross Site Scriptinginfo

TitleUmbraco Umbraco CMS Version 12.3.6 Cross Site Scripting
DescriptionWhile saving and previewing the content 'culture' parameter in file path /umbraco/preview/frame?id{}&culture=en-US is vulnerable to stored cross site scripting. Attack vector(s) 1. Login to the Umbraco dashboard with a user who have privilege to edit the website content. 2. Navigate to Content tab and click any one of the entries from content tab. 3. Click on "Save and preview," and a request will pass with the file path /umbraco/preview/frame?id{}&culture=en-US, Take the request to repeater. 4. Enter the payload "%22%3e%3cscript%3ealert(document.domain)%3c%2fscript%3e" in the culture parameter; it will redirect to the location as "../../{id}?culture="><script>alert(document.domian)</script>" with the 301 status code, simply follow the redirection. 5. A redirected request will send our payload and in response, we can see the executed payload.
Source⚠️ https://owasp.org/www-community/attacks/xss/
User
 kushkira (UID 60170)
Submission10/20/2024 10:19 (1 Year ago)
Moderation11/03/2024 08:39 (14 days later)
StatusAccepted
VulDB entry282930 [Umbraco CMS up to 10.7.7/12.3.6/13.5.2/14.3.1/15.1.1 Dashboard frame?id{} culture cross site scripting]
Points20