Exponent CMS 2.6.0patch2 allows an authenticated user to inject persistent JavaScript code on the "User-Agent" header when logging in. When an administrator user visits the "User Sessions" tab, the JavaScript will be triggered allowing an attacker to compromise the administrator session.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/exponentcms/exponent-cms/issues/1546 | issue tracking exploit third party advisory |
https://fluidattacks.com/advisories/cobain/ | issue tracking exploit third party advisory |
https://exponentcms.lighthouseapp.com/projects/61783/tickets/1461 | issue tracking exploit vendor advisory |