A stored-self XSS exists in LightCMS v1.3.4, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/SensitiveWords.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/eddy8/LightCMS/issues/18 | issue tracking exploit third party advisory |
http://packetstormsecurity.com/files/161562/LightCMS-1.3.4-Cross-Site-Scripting.html | exploit vdb entry third party advisory |
https://gist.github.com/Peithon/1c628ded0c4fc96c6331c3cce1d0c69b | third party advisory exploit |
https://www.exploit-db.com/exploits/49598 | exploit vdb entry third party advisory |