Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-45744 PoC — Bludit 跨站脚本漏洞

Source
Associated Vulnerability
Title:Bludit 跨站脚本漏洞 (CVE-2021-45744)
Description:Bludit是一套开源的轻量级博客内容管理系统(CMS)。 Bludit 中存在跨站脚本漏洞,该漏洞源于产品登陆面板中的标签部分未对输入数据做有效验证。攻击者可通过该漏洞执行客户端代码。以下产品及版本受到影响 Bludit 3.13.1 。
Description
CVE-2021-45744 - A Stored Cross Site Scripting (XSS) vulnerability exists in bludit 3.13.1 via the TAGS section in login panel. Application stores attacker injected dangerous JavaScript in to the database and executes without validating.
Readme
# CVE-2021-45744

### Exploit Title: Bludit 3.13.1 - TAGS Field Stored Cross Site Scripting (XSS)
### Exploit Author: <a href="https://www.plsanu.com">P.L.Sanu</a>
### CVE: CVE-2021-45744
### CVSS: 5.4 MEDIUM
### References: 
- https://www.plsanu.com/bludit-3-13-1-tags-field-stored-cross-site-scripting-xss
- https://nvd.nist.gov/vuln/detail/CVE-2021-45744
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45744

### Description:
A Stored Cross Site Scripting (XSS) vulnerability exists in bludit 3.13.1 via the TAGS section in login panel. Application stores attacker injected dangerous JavaScript in to the database and executes without validating.

### Exploit:
1. Login to the admin panel - http://localhost/admin
2. Navigate to New content section.
3. Enter the title of the post Ex:test
4. Click on the Options button.
5. Navigate to Advanced tab and inject the below payload in TAGS section.

### Payload:
```html
"><script>alert("XSS")</script>
```

6. Click on Save button.
7. Open the post(test).
8. Malicious javascript code triggered.

### Impact:
An attacker can able to inject malicious JavaScript code in TAGS Field Section.

### Mitigation:
It is recommended to sanitize all the input fields throughout the application.
File Snapshot

[4.0K] /data/pocs/208a67f4525c1b22b693128272ce469f0fc57a8a └── [1.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.