Headline
CVE-2022-41392: [Security] Stored XSS · Issue #38 · totaljs/cms
A cross-site scripting (XSS) vulnerability in TotalJS commit 8c2c8909 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website name text field under Main Settings.
Tested version: 8c2c8909 (latest)
Steps to reproduce the vulnerability:
- Login in the application.
- Set " <script>alert(document.domain)</script> as website name.
- Fill other required fields with random values and save.
- Then just visit the admin dashboard and the alert will fire.
Each time a target will visit the dashboard the payload will fire, even if the target is not logged in! Since the wesbite redirects to /admin/ presenting the login form, but the payload is reflected also there.
In order to test this, just click logout and reload the page.