Skip to content

tokenly-cms – Cross-Site Scripting (XSS) in “success.php” #116

@bestshow

Description

@bestshow

Product: tokenly-cms
Download: https://github.com/tokenly/tokenly-cms
Vunlerable Version: latest version
Tested Version: latest version
Author:ADLab of Venustech

Advisory Details:
A Cross-Site Scripting (XSS) was discovered in “tokenly-cms latest version”, which can be exploited to execute arbitrary code.
The vulnerability exist due to insufficient filtration of user-supplied data in the “path” HTTP GET parameter passed to the “tokenly-cms-master/www/resources/filemanager/uploader/success.php” URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
The exploitation example below uses the "alert()" JavaScript function to see a pop-up messagebox:
Poc:
http://localhost/.../tokenly-cms-master/www/resources/filemanager/uploader/success.php?path=%22%3E%3Cscript%3Ealert(1);%3C/script%3E%3C%22

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions