Lucene search

K
packetstormMattia FurlaniPACKETSTORM:145828
HistoryJan 11, 2018 - 12:00 a.m.

Joomla! Easydiscuss Cross Site Scripting

2018-01-1100:00:00
Mattia Furlani
packetstormsecurity.com
49

0.001 Low

EPSS

Percentile

43.0%

`# Exploit Title: Joomla Plugin Easydiscuss <4.0.21 Persistent XSS in Edit Message  
# Date: 06-01-2018  
# Software Link: https://stackideas.com/easydiscuss  
# Exploit Author: Mattia Furlani  
# CVE: CVE-2018-5263  
# Category: webapps  
  
1. Description  
  
Whenever a user edits a message with <\textarea> inside the body, everything after the <\textarea> will be executed in the useras browser. Works with every version up to 4.0.20  
  
  
2. Proof of Concept  
  
Login with permissions to post a message, insert <\textarea> in the body and add any html code after that, whenever a user tries to edit that message the code writed after you closed the textarea will be executed  
  
  
3. Solution:  
  
Update to version 4.0.21  
https://stackideas.com/blog/easydiscuss4021-update  
  
`

0.001 Low

EPSS

Percentile

43.0%