Lucene search

K
exploitpackMattia FurlaniEXPLOITPACK:CDA70C2523D25E78084B755FD597DE6D
HistoryJan 10, 2018 - 12:00 a.m.

Joomla! Component Easydiscuss 4.0.21 - Cross-Site Scripting

2018-01-1000:00:00
Mattia Furlani
16

EPSS

0.001

Percentile

43.0%

Joomla! Component Easydiscuss 4.0.21 - Cross-Site Scripting

# Exploit Title: Joomla Plugin Easydiscuss <4.0.21 Persistent XSS in Edit Message
# Date: 06-01-2018
# Software Link: https://stackideas.com/easydiscuss
# Exploit Author: Mattia Furlani
# CVE: CVE-2018-5263
# Category: webapps

1. Description

Whenever a user edits a message with <\textarea> inside the body, everything after the <\textarea> will be executed in the user’s browser. Works with every version up to 4.0.20


2. Proof of Concept

Login with permissions to post a message, insert <\textarea> in the body and add any html code after that, whenever a user tries to edit that message the code writed after you closed the textarea will be executed


3. Solution:

Update to version 4.0.21
https://stackideas.com/blog/easydiscuss4021-update

EPSS

0.001

Percentile

43.0%

Related for EXPLOITPACK:CDA70C2523D25E78084B755FD597DE6D