Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-12562 PoC — DNN 跨站脚本漏洞

Source
Associated Vulnerability
Title:DNN 跨站脚本漏洞 (CVE-2019-12562)
Description:DNN(又名DotNetNuke)是美国DNN公司的一套由微软支持、基于ASP.NET平台的开源内容管理系统(CMS)。该系统具有易于安装、可扩展、功能丰富等特点。 DNN 9.4.0之前版本中存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
Description
Stored Cross-Site Scripting in DotNetNuke (DNN) Version before 9.4.0 | XSS to RCE
Readme
# CVE-2019-12562
![CVE-2019-12562](https://mayaseven.com/wp-content/uploads/2019/09/CVE-2019-12562-900-600.gif)
Stored Cross-Site Scripting in DotNetNuke (DNN) Version before 9.4.0 allows remote attackers to store and embed the malicious script into the admin notification page. The exploit could be used to perfom any action with admin privileges such as managing content, adding users, uploading backdoors to the server, etc. Successful exploitation occurs when an admin user visits a notification page with stored cross-site scripting.

### Exploitation
* Config the exploit file
```
TARGET_URL = "http://targetdomain/DotNetNuke"
USERNAME = "MAYASEVEN"   # At least five characters long
PASSWORD = "P@ssw0rd" # At least 0 non-alphanumeric characters, At least 7 characters
EMAIL = "research@mayaseven.com" # Change email to any you want
# A web server for listening an event
LISTEN_URL = "http://yourdomain.com:1337"
```

* Running the exploit if the target vulnerable, the exploit will register a dummy user with XSS attached in the field "Display Name" and you will get payload.js.
```
python3 CVE-2019-12562.py
```

* You have to serve the webserver and place payload.js on it for waiting for admin connection.
```
python -m SimpleHTTPServer 1337
```

**This exploit will create a superuser and upload a webshell to the target server**

**Exploit Condition : Successful exploitation occurs when an admin user visits a notification page.**

Read More: https://mayaseven.com/cve-2019-12562-stored-cross-site-scripting-in-dotnetnuke-dnn-version-v9-3-2/
CVE Reference: https://www.cvedetails.com/cve/CVE-2019-12562/
File Snapshot

[4.0K] /data/pocs/4e7972b0f0b79671e2a606fcf6e47fc58cd5cb9c ├── [8.3K] CVE-2019-12562.py └── [1.6K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.