textpattern 4.8.7 is vulnerable to Cross Site Scripting (XSS) via /textpattern/index.php,Body. A remote and unauthenticated attacker can use XSS to trigger remote code execution by uploading a webshell. To do so they must first steal the CSRF token before submitting a file upload request.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.pentest.co.uk | third party advisory |
https://www.cornerpirate.com | not applicable |
https://pentest.co.uk/labs/leveraging-xss-to-get-rce-in-textpattern/ | third party advisory exploit |