HTML Injection- October CMS - CVE-2018-7198


HTML Injection- October CMS

By- Samrat Das

Hi Readers,

Recently while performing some open source security assessment, I came across an CMS Application, “October CMS” . Curious to explore its functionalities, I set up a local copy and started playing around to find security vulnerabilities’. 

Title of the Vulnerability:  HTML Injection.

Vulnerability Class: Code Execution/ Information Stealing

Technical Details & Description: The application source code is coded in a way which allows malicious HTML commands to be executed in the inner pages which can lead to execution of arbitrary code.

CVE ID allocated: -  CVE-2018-7198

Product & Service Introduction: October CMS

Steps to Re-Produce –
1.       Visit the application
2.       Visit the Add Posts Page.
3.        Goto edit function and add any html payload, it gets saved and executed further in web page.

Exploitation Technique: A attacker can perform application defacing to information stealing.

Severity Level: High

Security Risk:
The presence of such a risk can lead to user data compromise as well as site defacing.

Exploit code:
<input type=text>

Affected Product Version: October CMS

Solution - Fix & Patch: The application code should be configured to encode input characters and prevent unsafe input.







Comments

  1. SAP stands for Systems Applications and Products in Data Processing. SAP, by definition, is also the name of the ERP (Enterprise Resource Planning) software as well as the name of the company.
    tally training in chennai

    hadoop training in chennai

    sap training in chennai

    oracle training in chennai

    angular js training in chennai

    ReplyDelete

Post a Comment

Popular posts from this blog

Stored XSS in Wonder CMS- CVE-2017-14522

Arbitrary file upload and RCE in Wonder CMS - CVE-2017-14521

Host Header Injection In Wonder CMS - CVE-2017-14523