Subrion 安全漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1771088 漏洞类型 跨站脚本
发布时间 2019-10-07 更新时间 2019-11-13
CVE编号 CVE-2019-17225 CNNVD-ID CNNVD-201910-221
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2019100029
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201910-221
|漏洞详情
Subrion CMS是Subrion团队的一套基于PHP的内容管理系统(CMS)。该系统可被集成到网站,并支持多种扩展插件等。 Subrion 4.2.1版本中存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
|漏洞EXP
# Title: Subrion 4.2.1 - 'Email' Persistant Cross-Site Scripting
# Date: 2019-10-07
# Author: Min Ko Ko (Creatigon)
# Vendor Homepage: https://subrion.org/
# CVE : https://nvd.nist.gov/vuln/detail/CVE-2019-17225
# Website : https://l33thacker.com
# Description :  Allows XSS via the panel/members/ Username, Full Name, or
# Email field, aka an "Admin Member JSON Update" issue.

First login the panel with user credential, Go to member tag from left menu.

http://localhost/panel/members/

Username, Full Name, Email are editable with double click on it. Insert the
following payload

<img src=x onerror=alert(document.cookie)>
|参考资料

来源:github.com

链接:https://github.com/intelliants/subrion/issues/845


来源:www.exploit-db.com

链接:https://www.exploit-db.com/exploits/47469


来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2019-17225


来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/154746/Subrion-4.2.1-Cross-Site-Scripting.html