Описание
Stored XSS in REDAXO
Summary
Stored XSS in REDAXO 5.18.1 - Article / "content/edit".
Details
On the latest version of Redaxo, v5.18.1, the article name field is susceptible to stored XSS.
Impact
A malicious actor can easily steal cookie using this stored XSS and perform a session hijacking attack.
Пакеты
redaxo/source
>= 5.12.0-beta1, <= 5.18.1
5.18.2
Связанные уязвимости
A vulnerability was found in Redaxo CMS 5.18.1. It has been classified as problematic. Affected is an unknown function of the file /index.php?page=structure&category_id=1&article_id=1&clang=1&function=edit_art&artstart=0 of the component Structure Management Page. The manipulation of the argument Article Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.