4
[webapps] CiviCRM 5.59.alpha1 - Stored XSS (Cross-Site Scripting)
source link: https://www.exploit-db.com/exploits/51478
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
CiviCRM 5.59.alpha1 - Stored XSS (Cross-Site Scripting)
# Exploit Title: CiviCRM 5.59.alpha1 - Stored XSS (Cross-Site Scripting)
# Date: 2023-02-02
# Exploit Author: Andrea Intilangelo
# Vendor Homepage: https://civicrm.org
# Software Link: https://civicrm.org/download
# Version: 5.59.alpha1, 5.58.0 (and earlier), 5.57.3 (and earlier)
# Tested on: Latest Version of Desktop Web Browsers (ATTOW: Firefox 109.0.1, Microsoft Edge 109.0.1518.70)
# CVE: CVE-2023-25440
Vendor Security Advisory: CIVI-SA-2023-05
Description:
A stored cross-site scripting (XSS) vulnerability in CiviCRM 5.59.alpha1 allows attacker to execute arbitrary web
scripts or HTML.
Injecting persistent javascript code inside the "Add Contact" function while creating a contact, in first/second name
field, it will be triggered once page gets loaded.
Steps to reproduce:
- Quick Add contact to CiviCRM,
- Insert a payload PoC inside the field(s)
- Click on 'Add contact'.
If a user visits the dashboard, as well as "Recently added" box, the javascript code will be rendered.
Recommend
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK