From 8a32e340d50f8ff6507c4fee2ad843f956a2df98 Mon Sep 17 00:00:00 2001 From: Exploit-DB Date: Tue, 4 Jun 2024 00:16:25 +0000 Subject: [PATCH] DB: 2024-06-04 8 changes to exploits/shellcodes/ghdb Sitefinity 15.0 - Cross-Site Scripting (XSS) appRain CMF 4.0.5 - Remote Code Execution (RCE) (Authenticated) CMSimple 5.15 - Remote Code Execution (RCE) (Authenticated) Dotclear 2.29 - Remote Code Execution (RCE) Monstra CMS 3.0.4 - Remote Code Execution (RCE) Serendipity 2.5.0 - Remote Code Execution (RCE) WBCE CMS v1.6.2 - Remote Code Execution (RCE) --- exploits/multiple/webapps/52035.txt | 23 ++++++ exploits/php/webapps/52036.py | 107 ++++++++++++++++++++++++++++ exploits/php/webapps/52037.py | 96 +++++++++++++++++++++++++ exploits/php/webapps/52038.py | 93 ++++++++++++++++++++++++ exploits/php/webapps/52039.py | 80 +++++++++++++++++++++ exploits/php/webapps/52040.txt | 14 ++++ exploits/php/webapps/52041.py | 72 +++++++++++++++++++ files_exploits.csv | 7 ++ 8 files changed, 492 insertions(+) create mode 100644 exploits/multiple/webapps/52035.txt create mode 100755 exploits/php/webapps/52036.py create mode 100755 exploits/php/webapps/52037.py create mode 100755 exploits/php/webapps/52038.py create mode 100755 exploits/php/webapps/52039.py create mode 100644 exploits/php/webapps/52040.txt create mode 100755 exploits/php/webapps/52041.py diff --git a/exploits/multiple/webapps/52035.txt b/exploits/multiple/webapps/52035.txt new file mode 100644 index 0000000000..4b30fc5bf1 --- /dev/null +++ b/exploits/multiple/webapps/52035.txt @@ -0,0 +1,23 @@ +# Exploit Title: Sitefinity 15.0 - Cross-Site Scripting (XSS) +# Date: 2023-12-05 +# Exploit Author: Aldi Saputra Wahyudi +# Vendor Homepage: https://www.progress.com/sitefinity-cms +# Version: < 15.0.0 +# Tested on: Windows/Linux +# CVE : CVE-2023-27636 + +# Description: In the backend of the Sitefinity CMS, a Cross-site scripting vulnerability has been discovered in all features that use SF-Editor + +# Steps To Reproduce: + +Attacker as lower privilege +Victim as Higher privilege + +1. Login as an Attacker +2. Go to the function using the SF Editor, go to the news page as example +3. Create or Edit news item +4. On the content form, insert the XSS payload as HTML +5. After the payload is inserted, click on the content form (just click) and publish or save +6. If the victim visits the page with XSS payload, XSS will be triggered + +Payload: