Skip to content
This repository has been archived by the owner on Sep 18, 2024. It is now read-only.

Stored XSS in profile page #797

Open
ghost opened this issue Jul 18, 2018 · 2 comments
Open

Stored XSS in profile page #797

ghost opened this issue Jul 18, 2018 · 2 comments

Comments

@ghost
Copy link

ghost commented Jul 18, 2018

Description:
Cross-site scripting (XSS) vulnerability in Gleez CMS allow remote attackers (users) to inject arbitrary Javascript or HTML via the profile page editor, which will result in a Stored XSS on his public profile.

Vulnerability Type: Stored XSS

Attack Vectors:

  1. Go to your profile page editor https://demo.gleezcms.org/user/edit
  2. Set your home page URL to : http://x.x/<svg onload=alert(document.cookie)>

Now when someone will check your profile page, alert(document.cookie) will be executed.

@anupriya17
Copy link
Member

anupriya17 commented Jul 18, 2018 via email

@ghost ghost changed the title Stored XSS in profil page Stored XSS in profile page Jul 19, 2018
@NicoleG25
Copy link

Has there been an update regarding this vulnerability?
Thanks.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants