Stored XSS in Wonder CMS- CVE-2017-14522


By- Samrat Das

Hi Readers

Recently in one of my pentest research, I found a CMS " WonderCMS" hosted in github.
Curious to explore its functionalities, I downloaded and set it up in my local system.

After fiddling with the source code, I found that it did not have any kind of security mechanism to filter any user input and accepted and stored in blindly without any sort of input validation

Title of the Vulnerability:  Stored XSS
Common Vulnerability Scoring System: 7.0
Vulnerability Class: Injection
Technical Details & Description: The application source code is coded in a way which allows user input values to be stored and processed by the application.
CVE ID allocated:  CVE-2017-14522
Product & Service Introduction: Wonder CMS 2.3.1
WonderCMS is an open source CMS (Content Management System) built with PHP, jQuery, HTML and CSS (Bootstrap responsive).

WonderCMS doesn't require any configuration and can be simply unzipped and uploaded to your server/hosting provider. All data is saved to a text file (JSON format) which is easily copied, moved, backed up and restored. WonderCMS runs on less than 50 functions and 850 lines of code and 5 files.

Steps to Re-Produce –
1.       Visit the application
2.       Pass any XSS payload into the application user input fields.
3.       The XSS immediately pops up in next screen
4.       Now every time the page is visited, the XSS gets triggered and thus becomes stored XSS


Exploitation Technique: A attacker can perform session hijacking/ remote port scans as well as deface the site via XSS
Severity Level: High
Security Risk:
The presence of such a risk can lead to user data compromise as well as site defacing.

Affected Product Version: 2.3.1
Solution - Fix & Patch: The application code should be configured in such a way, that any random user input be rejected and client and server side validation should be ensured to filter html input and javascript input

Step by step for the attack:







Comments

  1. I have a fancy for your posts and I think they are very good. I can make full use of them to handle with some problems in my life. Articles seems to be written well, so they are easy to understand. Thank you for your sharing.
    sales pop master free
    sales pop master app

    ReplyDelete
  2. Thanks for sharing this wonderful article. :)

    ReplyDelete
  3. i really like this article. nice and good article. yes I'm agree with you,i will share it with others. thanks for sharing the article with us.
    thesis writers in India

    ReplyDelete
  4. Such A nice post... thanks For Sharing !!Great information for new guy like Happy New year 2020

    ReplyDelete
  5. Such A nice post... thanks For Sharing !!Great information for new guy like Hanuman Chalisa Lyrics

    ReplyDelete
  6. You've made some really good points there. I checked on the internet for more info about the issue info and found most individuals will go along with your views on this website.

    ReplyDelete
  7. An impressive share! I have just forwarded this onto a coworker who had been conducting a little homework on this technology. And he in fact bought me dinner due to the fact that I found it for him... lol. So allow me to reword this.... Thank YOU for the meal!! But yeah, thanx for spending time to discuss this topic here on your website.

    ReplyDelete

Post a Comment

Popular posts from this blog

Arbitrary file upload and RCE in Wonder CMS - CVE-2017-14521

Host Header Injection In Wonder CMS - CVE-2017-14523