Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stored XSS in bukutamu page #1

Open
Ascema opened this issue Aug 6, 2018 · 1 comment
Open

Stored XSS in bukutamu page #1

Ascema opened this issue Aug 6, 2018 · 1 comment

Comments

@Ascema
Copy link

Ascema commented Aug 6, 2018

Description:
A cross site scripting (XSS) vulnerability in AuraCMS may allow remote attackers (users) to inject arbitrary Web scripts through the source editor, which will cause an attacker (user) to get the administrator's cookie and log in to the administrator interface.

Vulnerability Type: Stored XSS

Attack Vectors:
1.Open AuraCMS as a user

image

2.Click on Bukutamu -> AddGuestbook

image

3.Add XSS Payload : <script>alert(document.cookie)</script>

image

4.Go to Bukutamu
5.XSS!

image

Attack Impact:
This can be used to perform operations on an administrator (or any user leaving a message on the site) and can lead to hijacking an administrator's cookie.

@auracms
Copy link
Owner

auracms commented Aug 6, 2018

Thanks For Your Issues, i have been update that file, please try again, if you finded bug again please email us

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants