Headline
CVE-2021-45744: GitHub - plsanu/Bludit-3.13.1-TAGS-Field-Stored-Cross-Site-Scripting-XSS: Bludit 3.13.1 - TAGS Field Stored Cross Site Scripting (XSS)
A Stored Cross Site Scripting (XSS) vulnerability exists in bludit 3.13.1 via the TAGS section in login panel.
Bludit 3.13.1 - TAGS Field Stored Cross Site Scripting (XSS)
Bludit 3.13.1 - TAGS Field Stored Cross Site Scripting (XSS)
Exploit Title: Bludit 3.13.1 - TAGS Field Stored Cross Site Scripting (XSS)****Date: 20/12/2021****Exploit Author: P.L.Sanu****Exploit Author Website: https://www.plsanu.com****Vendor Homepage: https://www.bludit.com****Software Link: https://www.bludit.com/releases/bludit-3-13-1.zip****Version: <= 3.13.1****Tested on: Windows 10****CVE :****Google Dork: N/A****Reference:
- https://www.plsanu.com/bludit-3-13-1-tags-field-stored-cross-site-scripting-xss
- https://github.com/plsanu/Bludit-3.13.1-TAGS-Field-Stored-Cross-Site-Scripting-XSS
Steps to Reproduce:
- Login to the admin panel http://localhost/admin
- Navigate to New content section.
- Enter the title of the post Ex:test
- Click on the Options button.
- Navigate to Advanced tab and inject the payload "><script>alert(“XSS”)</script> in TAGS section.
- Click on Save button.
- Open the post(test).
- Malicious javascript code triggered.